Show simple item record

dc.contributor.authorAlbin, Eugene
dc.contributor.authorRowe, Neil C.
dc.dateMarch 2012
dc.date.accessioned2013-09-18T18:12:39Z
dc.date.available2013-09-18T18:12:39Z
dc.date.issued2012-03
dc.identifier.urihttps://hdl.handle.net/10945/36465
dc.descriptionThis paper appeared in the Eighth International Symposium on the Frontiers of Information Systems and Network Applications, Fukuoka, Japan, March 2012.en_US
dc.description.abstractThe Suricata intrusion-detection system for computer-network monitoring has been advanced as an open-source improvement on the popular Snort system that has been available for over a decade. Suricata includes multi-threading to improve processing speed beyond Snort. Previous work comparing the two products has not used a real-world setting. We did this and evaluated the speed, memory requirements, and accuracy of the detection engines in three kinds of experiments: (1) on the full traffic of our school as observed on its "backbone" in real time; (2) on a supercomputer with packets recorded from the backbone; and (3) in response to malicious packets sent by a red-teaming product. We used the same set of rules for both products with a few small exceptions where capabilities were missing. We conclude that Suricata can handle larger volumes of traffic than Snort with similar accuracy, and that its performance scaled roughly linearly with the number of processors up to 48. We observed no significant speed or accuracy advantage of Suricata over Snort in its current state, but it is still being developed. Our methodology should be useful for comparing other intrusiondetection products.en_US
dc.publisherMonterey, California. Naval Postgraduate Schoolen_US
dc.rightsThis publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.en_US
dc.titleA Realistic Experimental Comparison of the Suricata and Snort Intrusion-Detection Systemsen_US
dc.typeConference Paperen_US
dc.contributor.departmentComputer Science (CS)
dc.subject.authorintrusion detectionen_US
dc.subject.authorcomputer networksen_US
dc.subject.authorSnorten_US
dc.subject.authorSuricataen_US
dc.subject.authorperformanceen_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record