Abstract
Infringement detection system and infringement avoidance systems (IDS/IAS) are crucial elements of computer network security. By using a freeware IDS tool like Snort, the outcomes of research are presented. Research has been made on a Snort IDS on a flexible, inexpensive reasonably powered machine known as Raspberry Pi2 (Model B), with a precise aim of finding their capability, competence and worth in the computer network atmosphere, where the price is an influencing aspect. SOHO and learning organization computer networks are some examples.
This is a preview of subscription content, log in via an institution.
References
Mehra, P.: A brief study and comparison of snort open source network intrusion detection system. Int. J. Adv. Res. Comput. Commun. Eng. 1(6), 383–385 (2012)
Depren, O., Topallar, M., Anarim, E., Ciliz, M.: An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks. Expert Syst. Appl. 29(4), 713–722 (2005)
Cusack, B., Alqahtani, M.: Acquisition of evidence from network intrusion detection systems. In: 11th Australian Digital Forensics Conference, pp. 36-43. Perth, Australia (2013)
Scarfone, K., Mell, P.: Intrusion detection and prevention systems. In: Stavroulakis, P., Stamp, M. (eds.) Handbook of Information and Communication Security 1, pp. 177–192. Springer, Heidelberg, Berlin (2010)
Paquet, C.: Implementing Cisco IOS Network Security (IINS 640-554). Indianapolis, Ind., Cisco Press (2012)
Instructables: Raspberry Pi Firewall and Intrusion Detection System. http://www.instructables.com/id/RaspberryPi-Firewall-and-Intrusion-Detection-Syst/step13/SNORT/. Accessed 24 Oct 2015
Hoque, M.S., Mukit, M.A., Naser, A., Bikas, M.: An implementation of intrusion detection system using genetic algorithm. Int. J. Netw. Security Appl. 4(2), 109–120 (2012)
Parkansky, K.: How to configure a snort IDS intrusion detection system on debian linux. Aboutdebian (2013). http://www.aboutdebian.com/snort.htm. Accessed 24 Oct 2015
Aldeid: Suricata-vs-snort-aldeid (2015). http://www.aldeid.com/wiki/Suricata-vs-snort. Accessed 24 Oct 2015
Rødfoss, J.T.: Comparison of Open Source Network Intrusion Detection Systems. University of Oslo, Oslo, Norway (2011)
Rani, S., Singh, V.: SNORT: an open source network security tool for intrusion detection in campus network environment. Int. J. Comput. Technol. Electr. Eng. (IJCTEE) 2(1), 1–3 (2012)
Snort: Snort blog: snort 2.9.7.3 (2015). http://blog.snort.org/2015/05/snort-2973-is-nowavailable.html. Accessed 24 Oct 2015
Pir, R.M.: Intrusion detection techniques and open source intrusion detection (IDS) tools. Int. J. Eng. Develop. Res. 2(3), 3290–3295 (2014)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Kattamuri, S.R., Kakulapati, V., Muthyala, N. (2018). Configuration of IRS Tool on Linux OS Using Low Cost Low Power Computer. In: Yang, XS., Nagar, A., Joshi, A. (eds) Smart Trends in Systems, Security and Sustainability. Lecture Notes in Networks and Systems, vol 18. Springer, Singapore. https://doi.org/10.1007/978-981-10-6916-1_16
Download citation
DOI: https://doi.org/10.1007/978-981-10-6916-1_16
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-6915-4
Online ISBN: 978-981-10-6916-1
eBook Packages: EngineeringEngineering (R0)