Open Access

Experimental load test statistics for the selected IPS tools on low-performance IoT devices


Cite

[1] M. Yassein, Q. Abuein, and S. Alasal, “Combining software-defined networking with Internet of Things: Survey on security performance aspects”, Proceedings of the International Conference on Engineering & MIS (ICEMIS) Monastir, Tunisia, 8-10 May 2017.10.1109/ICEMIS.2017.8273027Search in Google Scholar

[2] A. Lupia and F. De Rango, “Performance evaluation of secure AODV with trust management under an energy aware perspective”, Proceedings of the International Symposium on Performance Evaluation of Computer Telecommunication Systems Monterey, CA, USA, 6-10, 2014.10.1109/SPECTS.2014.6879999Search in Google Scholar

[3] C. Y. Tseung, K. P. Chow, and X. Zhang, “Anti-DDoS technique using self-learning bloom filter”, Proceedings of the 2017 IEEE International Conference on Intelligence Security Informatics (ISI), Beijing China, 2017.10.1109/ISI.2017.8004917Search in Google Scholar

[4] B. Mukherjee, R. L. Neupane, and P. Calyam, “End-to-End IoT Security Middleware for Cloud-Fog Communication”, Proceedings of the 2017 IEEE 4th International Conference on Cyber Security Cloud Computing (CSCloud), New York USA, 2017.10.1109/CSCloud.2017.62Search in Google Scholar

[5] G. Kalnoor and J. Agarkhed, “Pattern Matching Intrusion Detection Technique for Wireless Sensor Networks”, Proceedings of the International Conference on Advances in Electrical Electronics, Information, Communication Bio-Informatics (AEEICB16), Chennai, India, 2016.10.1109/AEEICB.2016.7538389Search in Google Scholar

[6] G. Kalnoor and J. Agarkhed, Snort - Network Intrusion Detection & Prevention System, Available online: https://www.snort.org (accessed on 1st August 2018).Search in Google Scholar

[7] P. Singh, S. Behal, and K. Kumar, “Performance Enhancement of a Malware Detection System using Score Based Prioritization of Snort Rules”, Proceedings of the 2015 International Conference on Green Computing Internet of Things (ICGCIoT), Noida India, 2016.10.1109/ICGCIoT.2015.7380636Search in Google Scholar

[8] A. Sagala, “Automatic Snort IDS Rule Generation Based on Honeypot Log”, Proceedings of the 2015 7th International Conference on Information Technology Electrical Engineering (ICITEE), Chiang Mai Thailand, 2015.10.1109/ICITEED.2015.7409013Search in Google Scholar

[9] A. Garg and P. Maheshwari, “Performance Analysis of Snort-based Intrusion Detection System”, Proceedings of the 2016 3rd International Conference on Advanced Computing Communication Systems (ICACCS), Coimbatore India, 2016.10.1109/ICACCS.2016.7586351Search in Google Scholar

[10] N. Naik, R. Diao, and Q. Shen, “Application of Dynamic Fuzzy Rule Interpolation for Intrusion Detection: D-FRI-Snort”, Proceedings of the 2016 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), Vancouver BC, Canada, 2016.10.1109/FUZZ-IEEE.2016.7737671Search in Google Scholar

[11] E. Albin and N. Rowe, “A Realistic Experimental Comparison of the Suricata Snort Intrusion-Detection Systems”, Proceedings of the 2012 26th International Conference on Advanced Information Networking Applications Workshops, Fukuoka Japan, 2012.10.1109/WAINA.2012.29Search in Google Scholar

[12] J. White, T. Fitzsimmons, and J. Matthews, “Quantitative analysis of intrusion detection systems: Snort Suricata”, SPIE Defense Security Sensing Cyber Security Conference, vol. 8757 Baltimore, USA, 2013.10.1117/12.2015616Search in Google Scholar

[13] M. Ennert, E. Chovancova, and Z. Dudlakova, “Testing of IDS model using several intrusion detection tools”, Journal of Applied Mathematics Computational Mechanics, vol. 14 no. 1, pp. 55-62, 2013.10.17512/jamcm.2015.1.05Search in Google Scholar

[14] K. Thongkanchorn, S. Ngamsuriyaroj, and V. Visoottiviseth, “Evaluation Studies of Three Intrusion Detection Systems under Various Attacks Rule Sets”, Proceedings of the 2013 IEEE International Conference of IEEE Region 10 (TENCON 2013), Xi’an China, 22-25, 2013.10.1109/TENCON.2013.6718975Search in Google Scholar

[15] S. Sremath, H. Sathu, and A. Sarrafzadeh, “Free open source intrusion detection systems: a study”, Proceedings of the 2015 International Conference on Machine Learning Cybernetics (ICMLC), Guangzhou China, 2015.Search in Google Scholar

[16] D. Bhosale and V. Mane, “Comparative Study Analysis of Network Intrusion Detection Tools”, Proceedings of the 2015 International Conference on Applied Theoretical Computing Communication Technology (iCATccT), Davangere India, 2015.10.1109/ICATCCT.2015.7456901Search in Google Scholar

[17] B. Brumen and J. Legvart, “Performance analysis of two open source intrusion detection systems”, Proceedings of the 2016 39th International Convention on Information Communication Technology Electronics Microelectronics (MIPRO), Opatija, Croatia, 2016.10.1109/MIPRO.2016.7522356Search in Google Scholar

[18] L. Tuong and K. Kimura, “2-Step Power Scheduling with Adaptive Control Interval for Network Intrusion Detection Systems on Multicores”, Proceedings of the 2016 IEEE 10th International Symposium on Embedded Multicore/Many-core Systems-on-Chip (MCSOC), Lyon France, 21-23, 2016.10.1109/MCSoC.2016.18Search in Google Scholar

[19] P. S. Horn, “Some Easy t Statistics.”, J, of the Americ. Statist. Assoc. 78, 930-936, 1983.10.1080/01621459.1983.10477042Search in Google Scholar

[20] https://github.com/esnet/iperf.Search in Google Scholar

eISSN:
1339-309X
Language:
English
Publication timeframe:
6 times per year
Journal Subjects:
Engineering, Introductions and Overviews, other