Analysis of the SNORT Intrusion Detection System Using Machine Learning
Abstract
Today, cyber-attacks that exploit networks and systems vulnerabilities are becoming more and more effective, reflecting the malicious intentions of certain Internet users. These attacks harm both individuals, through loss or theft of personal data and invasion of privacy, and businesses, through loss of know-how, damage to reputation and financial loss. Against this backdrop, it is essential that network operators adopt robust security measures. Intrusion Detection Systems (IDS) are emerging as promising solutions for strengthening network security. An IDS discreetly monitors network traffic for abnormal or suspicious behavior, enabling proactive accessibility measures to be taken against intrusion attempts. This article focuses on intrusion detection technologies, and more specifically on SNORT, a tool capable of identifying network intrusions in real time. We will explore the vulnerabilities associated with this technology and look at research that applies machine learning methods to overcome these shortcomings.The submitting author warrants that the submission is original and that she/he is the author of the submission together with the named co-authors; to the extend the submission incorporates text passages, figures, data or other material from the work of others, the submitting author has obtained any necessary permission.
Articles in this journal are published under the Creative Commons Attribution Licence (CC-BY). This is to get more legal certainty about what readers can do with published articles, and thus a wider dissemination and archiving, which in turn makes publishing with this journal more valuable for you, the authors.
In order for iJIST to publish and disseminate research articles, we need publishing rights. This is determined by a publishing agreement between the author and iJIST.
By submitting an article the author grants to this journal the non-exclusive right to publish it. The author retains the copyright and the publishing rights for his article without any restrictions.
Privacy Statement
The names and email addresses entered in this journal site will be used exclusively for the stated purposes of this journal and will not be made available for any other purpose or to any other party.