Skip to main content

Configuration of IRS Tool on Linux OS Using Low Cost Low Power Computer

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 18))

Abstract

Infringement detection system and infringement avoidance systems (IDS/IAS) are crucial elements of computer network security. By using a freeware IDS tool like Snort, the outcomes of research are presented. Research has been made on a Snort IDS on a flexible, inexpensive reasonably powered machine known as Raspberry Pi2 (Model B), with a precise aim of finding their capability, competence and worth in the computer network atmosphere, where the price is an influencing aspect. SOHO and learning organization computer networks are some examples.

This is a preview of subscription content, log in via an institution.

References

  1. Mehra, P.: A brief study and comparison of snort open source network intrusion detection system. Int. J. Adv. Res. Comput. Commun. Eng. 1(6), 383–385 (2012)

    Google Scholar 

  2. Depren, O., Topallar, M., Anarim, E., Ciliz, M.: An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks. Expert Syst. Appl. 29(4), 713–722 (2005)

    Article  Google Scholar 

  3. Cusack, B., Alqahtani, M.: Acquisition of evidence from network intrusion detection systems. In: 11th Australian Digital Forensics Conference, pp. 36-43. Perth, Australia (2013)

    Google Scholar 

  4. Scarfone, K., Mell, P.: Intrusion detection and prevention systems. In: Stavroulakis, P., Stamp, M. (eds.) Handbook of Information and Communication Security 1, pp. 177–192. Springer, Heidelberg, Berlin (2010)

    Chapter  Google Scholar 

  5. Paquet, C.: Implementing Cisco IOS Network Security (IINS 640-554). Indianapolis, Ind., Cisco Press (2012)

    Google Scholar 

  6. Instructables: Raspberry Pi Firewall and Intrusion Detection System. http://www.instructables.com/id/RaspberryPi-Firewall-and-Intrusion-Detection-Syst/step13/SNORT/. Accessed 24 Oct 2015

  7. Hoque, M.S., Mukit, M.A., Naser, A., Bikas, M.: An implementation of intrusion detection system using genetic algorithm. Int. J. Netw. Security Appl. 4(2), 109–120 (2012)

    Google Scholar 

  8. Parkansky, K.: How to configure a snort IDS intrusion detection system on debian linux. Aboutdebian (2013). http://www.aboutdebian.com/snort.htm. Accessed 24 Oct 2015

  9. Aldeid: Suricata-vs-snort-aldeid (2015). http://www.aldeid.com/wiki/Suricata-vs-snort. Accessed 24 Oct 2015

  10. Rødfoss, J.T.: Comparison of Open Source Network Intrusion Detection Systems. University of Oslo, Oslo, Norway (2011)

    Google Scholar 

  11. Rani, S., Singh, V.: SNORT: an open source network security tool for intrusion detection in campus network environment. Int. J. Comput. Technol. Electr. Eng. (IJCTEE) 2(1), 1–3 (2012)

    Google Scholar 

  12. Snort: Snort blog: snort 2.9.7.3 (2015). http://blog.snort.org/2015/05/snort-2973-is-nowavailable.html. Accessed 24 Oct 2015

  13. Pir, R.M.: Intrusion detection techniques and open source intrusion detection (IDS) tools. Int. J. Eng. Develop. Res. 2(3), 3290–3295 (2014)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S. R. Kattamuri .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kattamuri, S.R., Kakulapati, V., Muthyala, N. (2018). Configuration of IRS Tool on Linux OS Using Low Cost Low Power Computer. In: Yang, XS., Nagar, A., Joshi, A. (eds) Smart Trends in Systems, Security and Sustainability. Lecture Notes in Networks and Systems, vol 18. Springer, Singapore. https://doi.org/10.1007/978-981-10-6916-1_16

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-6916-1_16

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-6915-4

  • Online ISBN: 978-981-10-6916-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics