Emulation of Snort on Deter Testbed
Main Article Content
Abstract
In the present era Internet has changed the normal way of performing the essential services such as banking, defense, trade, and marketing being operated. These operations of our day to day life are replaced by cheaper, more effect Internet based applications. It happens all because of the growth of the internet but with advancement the number of attacks on these services is increasing day by day. During internet design the more emphasis is on its functionality rather than the security due to which so many loop holes are generated in the internet. The possible way to detect those loop holes and then protects the system from the attack. The Intrusion Detection System is one type of guard which protect our network from attacking the by detecting the reason or way by which attack is performed. To configure the Intrusion Detection system we required a system and to test an Intrusion Detection System we required a complete setup lab or a network of computers. DETER EMULAB is one kind of lab based on emulation which provides us facility for performing the experiment related to the network security. In this paper we present our ongoing work of deployment and operation of an Intrusion Detection System Snort (which sniffs the packets and check the possibility of attack on our system and alert us regarding the occurrence of attack) on DETER EMULAB node.
Keywords: Snort; Deter; IDS ; Defense;.Mysql
Downloads
Article Details
COPYRIGHT
Submission of a manuscript implies: that the work described has not been published before, that it is not under consideration for publication elsewhere; that if and when the manuscript is accepted for publication, the authors agree to automatic transfer of the copyright to the publisher.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work
- The journal allows the author(s) to retain publishing rights without restrictions.
- The journal allows the author(s) to hold the copyright without restrictions.