Journal articles on the topic 'Snort'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Snort.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Sabekti, Muhamad Agung. "Pembuatan Web Interface Snort untuk Managemen Firewall dengan Operasi CRUD (Create, Read, Update, Delete) pada File System Snort dan Pengujian Web dengan Serangan serta Notifikasi pada Email dan Telegram." Indonesian Journal of Applied Informatics 3, no. 2 (August 4, 2019): 74. http://dx.doi.org/10.20961/ijai.v3i2.27836.
Full textAcosta, Andres, and Leonardo Rodriguez. "Snort como herramienta administrativa." INVENTUM 3, no. 5 (July 7, 2008): 74–78. http://dx.doi.org/10.26620/uniminuto.inventum.3.5.2008.74-78.
Full textSaganowski, Łukasz, and Tomasz Andrysiak. "Snort IDS Hybrid ADS Preprocessor." Image Processing & Communications 17, no. 4 (December 1, 2012): 17–22. http://dx.doi.org/10.2478/v10248-012-0024-0.
Full textDewi Paramitha, Ida Ayu Shinta, Gusti Made Arya Sasmita, and I. Made Sunia Raharja. "Analisis Data Log IDS Snort dengan Algoritma Clustering Fuzzy C-Means." Majalah Ilmiah Teknologi Elektro 19, no. 1 (October 15, 2020): 95. http://dx.doi.org/10.24843/mite.2020.v19i01.p14.
Full textGunawan, Agus Riki, Nyoman Putra Sastra, and Dewa Made Wiharta. "Penerapan Keamanan Jaringan Menggunakan Sistem Snort dan Honeypot Sebagai Pendeteksi dan Pencegah Malware." Majalah Ilmiah Teknologi Elektro 20, no. 1 (March 1, 2021): 81. http://dx.doi.org/10.24843/mite.2021.v20i01.p09.
Full textDasmen, Rahmat Novrianda, Cendri Ariyanto, Muhammad Haris Surya, and Hafiizh Ramadhan. "Penerapan Snort Sebagai Sistem Pendeteksi Serangan Keamanan Jaringan." Jurasik (Jurnal Riset Sistem Informasi dan Teknik Informatika) 7, no. 1 (February 28, 2022): 8. http://dx.doi.org/10.30645/jurasik.v7i1.409.
Full textSalah, K., and A. Kahtani. "Improving Snort performance under Linux." IET Communications 3, no. 12 (2009): 1883. http://dx.doi.org/10.1049/iet-com.2009.0114.
Full textJaw, Ebrima, and Xueming Wang. "A novel hybrid-based approach of snort automatic rule generator and security event correlation (SARG-SEC)." PeerJ Computer Science 8 (March 2, 2022): e900. http://dx.doi.org/10.7717/peerj-cs.900.
Full textSaputra, Ferry Astika, Muhammad Salman, Jauari Akhmad Nur Hasim, Isbat Uzzin Nadhori, and Kalamullah Ramli. "The Next-Generation NIDS Platform: Cloud-Based Snort NIDS Using Containers and Big Data." Big Data and Cognitive Computing 6, no. 1 (February 7, 2022): 19. http://dx.doi.org/10.3390/bdcc6010019.
Full textTasneem, Aaliya, Abhishek Kumar, and Shabnam Sharma. "Intrusion Detection Prevention System using SNORT." International Journal of Computer Applications 181, no. 32 (December 17, 2018): 21–24. http://dx.doi.org/10.5120/ijca2018918280.
Full textAhmed, Ghilman, Muhammad Naeem Ahmed Khan, and Muhammad Shamraiz Bashir. "A Linux-based IDPS using Snort." Computer Fraud & Security 2015, no. 8 (August 2015): 13–18. http://dx.doi.org/10.1016/s1361-3723(15)30076-2.
Full textDian Pratiwi, Yuni, Enggar Alfianto, and Shah Khadafi. "IMPLEMENTASI METODE INTRUSION DETECTION SYSTEM (IDS) MENGGUNAKAN PERANGKAT LUNAK PORTSENTRY DAN SNORT BERBASIS SISTEM OPERASI LINUX UBUNTU 16.04 LTS." e-NARODROID 4, no. 2 (September 28, 2018): 35–48. http://dx.doi.org/10.31090/narodroid.v4i2.732.
Full textPurba, Winrou Wesley, and Rissal Efendi. "Perancangan dan analisis sistem keamanan jaringan komputer menggunakan SNORT." AITI 17, no. 2 (February 23, 2021): 143–58. http://dx.doi.org/10.24246/aiti.v17i2.143-158.
Full textAminanto, Alja, and Wiwin Sulistyo. "Simulasi Sistem Keamanan Jaringan Komputer Berbasis IPS Snort dan Honeypot Artilery." AITI 16, no. 2 (June 17, 2020): 135–50. http://dx.doi.org/10.24246/aiti.v16i2.135-150.
Full textAstika, S. Ferry, M. Jauhari, N. Isbatuzzin, M. Salman, and Kalamullah Ramli. "BUILDING A DYNAMIC SCALABLE PARALLEL CLOUD-BASED SNORT NIDS USING CONTAINERS AND BIG DATA." Journal of Southwest Jiaotong University 56, no. 5 (October 30, 2021): 317–26. http://dx.doi.org/10.35741/issn.0258-2724.56.5.27.
Full textLi, Jing Jiao, Yong Chen, Ho Cholman, Zhen Lin Lu, and Ling Qiao Nan. "Design and Implementation of NIDS String Matching Based on SOPC." Advanced Materials Research 424-425 (January 2012): 551–54. http://dx.doi.org/10.4028/www.scientific.net/amr.424-425.551.
Full textGdowski, Bartłomiej, Rafał Kościej, and Marcin Niemiec. "Heuristic-based Intrusion Detection Functionality in a Snort Environment." Information & Security: An International Journal 50 (2021): 23–36. http://dx.doi.org/10.11610/isij.5010.
Full textMarta, I. Komang Krisna Ade, I. Nyoman Buda Hartawan, and I. Kadek Susila Satwika. "ANALISIS SISTEM MONITORING KEAMANAN SERVER DENGAN SMS ALERT BERBASIS SNORT." INSERT : Information System and Emerging Technology Journal 1, no. 1 (June 25, 2020): 25. http://dx.doi.org/10.23887/insert.v1i1.25874.
Full textLukman, Lukman, and Melati Suci. "Analisis Perbandingan Kinerja Snort Dan Suricata Sebagai Intrusion Detection System Dalam Mendeteksi Serangan Syn Flood Pada Web Server Apache." Respati 15, no. 2 (July 10, 2020): 6. http://dx.doi.org/10.35842/jtir.v15i2.343.
Full textAnanta, Ahmadi Yuli. "SELEKSI NOTIFIKASI SERANGAN BERBASIS IDS SNORT MENGGUNAKAN METODE K-MEANS." SMARTICS Journal 3, no. 2 (October 31, 2017): 31–37. http://dx.doi.org/10.21067/smartics.v3i2.1954.
Full textPanggabean, Parningotan. "ANALISIS NETWORK SECURITY SNORT METODE INTRUSION DETECTION SYSTEM UNTUK OPTIMASI KEAMANAN JARINGAN KOMPUTER." Jursima 6, no. 1 (June 8, 2018): 1. http://dx.doi.org/10.47024/js.v6i1.107.
Full textGoel, Aaruni, and Ashok Vasishtha. "The Implementation and Assessment of Snort Capabilities." International Journal of Computer Applications 167, no. 13 (June 15, 2017): 15–23. http://dx.doi.org/10.5120/ijca2017914525.
Full textWu, Qing-Xiu. "The Network Protocol Analysis Technique in Snort." Physics Procedia 25 (2012): 1226–30. http://dx.doi.org/10.1016/j.phpro.2012.03.224.
Full textZhang, Dongyan, and Shuo Wang. "Optimization of traditional Snort intrusion detection system." IOP Conference Series: Materials Science and Engineering 569 (August 9, 2019): 042041. http://dx.doi.org/10.1088/1757-899x/569/4/042041.
Full textVaseer, Gurven, Pushpinder Singh Patheja, and Garima Ghai. "Intrusion Detection a Challenge: SNORT the savior." International Journal of Computer Trends and Technology 45, no. 1 (March 25, 2017): 1–3. http://dx.doi.org/10.14445/22312803/ijctt-v45p101.
Full textMurthy, K. Sreerama, S. Pallam Setty, and G. S. V. P. Raju. "Performance analysis of Mail Clients using SNORT." International Journal of Computer & Organization Trends 35, no. 1 (September 25, 2016): 1–7. http://dx.doi.org/10.14445/22492593/ijcot-v35p301.
Full textArman, Molavi, and Nur Rachmat. "IMPLEMENTASI SISTEM KEAMANAN WEB SERVER MENGGUNAKAN PFSENSE." Jusikom : Jurnal Sistem Komputer Musirawas 5, no. 1 (May 31, 2020): 13–23. http://dx.doi.org/10.32767/jusikom.v5i1.752.
Full textShah, Syed Ali Raza, Biju Issac, and Seibu Mary Jacob. "Intelligent Intrusion Detection System Through Combined and Optimized Machine Learning." International Journal of Computational Intelligence and Applications 17, no. 02 (June 2018): 1850007. http://dx.doi.org/10.1142/s1469026818500074.
Full textWidodo, Rio, and Imam Riadi. "Intruder Detection Systems on Computer Networks Using Host Based Intrusion Detection System Techniques." Buletin Ilmiah Sarjana Teknik Elektro 3, no. 1 (January 13, 2021): 21. http://dx.doi.org/10.12928/biste.v3i1.1752.
Full textShim, Kyu-Seok, Sung-Ho Yoon, Su-Kang Lee, Sung-Min Kim, Woo-Suk Jung, and Myung-Sup Kim. "Automatic Generation of Snort Content Rule for Network Traffic Analysis." Journal of Korean Institute of Communications and Information Sciences 40, no. 4 (April 30, 2015): 666–77. http://dx.doi.org/10.7840/kics.2015.40.4.666.
Full textJia, Ling. "Campus Network Security Program Based on Snort Network Security Intrusion Detection System." Advanced Materials Research 433-440 (January 2012): 3235–40. http://dx.doi.org/10.4028/www.scientific.net/amr.433-440.3235.
Full textSampath, Nithya. "Intrusion Detection in Software Defined Networking Using Snort and Mirroring." International Journal of Psychosocial Rehabilitation 23, no. 4 (December 31, 2019): 1699–710. http://dx.doi.org/10.37200/ijpr/v23i4/pr190501.
Full textErlansari, Aan, Funny Farady Coastera, and Afief Husamudin. "Early Intrusion Detection System (IDS) using Snort and Telegram approach." SISFORMA 7, no. 1 (June 10, 2020): 21. http://dx.doi.org/10.24167/sisforma.v7i1.2629.
Full textPark, Wonhyung, and Byeong Ho Kang. "An Enhancement of Optimized Detection Rule of Security Monitoring and Control for Detection of Cyberthreat in Location-Based Mobile System." Mobile Information Systems 2017 (2017): 1–13. http://dx.doi.org/10.1155/2017/8501976.
Full textHa, Jaecheol. "Preprocessor Implementation of Open IDS Snort for Smart Manufacturing Industry Network." Journal of the Korea Institute of Information Security and Cryptology 26, no. 5 (October 31, 2016): 1313–22. http://dx.doi.org/10.13089/jkiisc.2016.26.5.1313.
Full textGeddes, Linda. "Snort stem cells to get them to brain." New Scientist 203, no. 2725 (September 2009): 12. http://dx.doi.org/10.1016/s0262-4079(09)62383-6.
Full textMarques, Oge, and Pierre Baillargeon. "Design of a multimedia traffic classifier for Snort." Information Management & Computer Security 15, no. 3 (June 12, 2007): 241–56. http://dx.doi.org/10.1108/09685220710759577.
Full textAickelin, Uwe, Jamie Twycross, and Thomas Hesketh Roberts. "Rule generalisation in intrusion detection systems using SNORT." International Journal of Electronic Security and Digital Forensics 1, no. 1 (2007): 101. http://dx.doi.org/10.1504/ijesdf.2007.013596.
Full textOlanrewaju, Rashidah Funke, Burhan Ul Islam Khan, Athaur Rahman Najeeb, Ku Nor Afiza Ku Zahir, and Sabahat Hussain. "Snort-based Smart and Swift Intrusion Detection System." Indian Journal of Science and Technology 11, no. 4 (January 1, 2018): 1–9. http://dx.doi.org/10.17485/ijst/2018/v11i4/120917.
Full textGavrilovic, Nadja, Vladimir Ciric, and Nikola Lozo. "Snort ids system visualization interface for alert analysis." Serbian Journal of Electrical Engineering 19, no. 1 (2022): 67–78. http://dx.doi.org/10.2298/sjee2201067g.
Full textKim, Hyeong-Dong, Ki-Hyun Kim, and Jae-Cheol Ha. "Development of Intrusion Detection System for GOOSE Protocol Based on the Snort." Journal of the Korea Institute of Information Security and Cryptology 23, no. 6 (December 31, 2013): 1181–90. http://dx.doi.org/10.13089/jkiisc.2013.23.6.1181.
Full textGuterres, Lilia Ervina Jeronimo, and Ahmad Ashari. "THE ANALYSIS OF WEB SERVER SECURITY FOR MULTIPLE ATTACKS IN THE TIC TIMOR IP NETWORK." IJCCS (Indonesian Journal of Computing and Cybernetics Systems) 14, no. 1 (January 31, 2020): 103. http://dx.doi.org/10.22146/ijccs.53265.
Full textStiawan, Deris, Dimas Wahyudi, Ahmad Heryanto, Samsuryadi Samsuryadi, Mohd Yazid Idris, Farkhana Muchtar, Mohammed Abdullah Alzahrani, and Rahmat Budiarto. "TCP FIN Flood Attack Pattern Recognition on Internet of Things with Rule Based Signature Analysis." International Journal of Online and Biomedical Engineering (iJOE) 15, no. 07 (April 15, 2019): 124. http://dx.doi.org/10.3991/ijoe.v15i07.9848.
Full textLee, Hyeong-Yun, Seong-Oun Hwang, and Beongku An. "Worm Detection and Containment using Earlybird and Snort on Deterlab." Journal of the Institute of Webcasting, Internet and Telecommunication 13, no. 1 (February 28, 2013): 71–76. http://dx.doi.org/10.7236/jiibc.2013.13.1.71.
Full textAprilianto, Tria, Sunu Jatmika, and Ihsan Wicaksono. "PERANCANGAN SISTEM PENDETKSI SERANGAN PADA SERVER JARINGAN KOMPUTER MENGGUNAKAN SNORT BERBASIS SMS GETEWAY." Jurnal Teknika 11, no. 1 (March 21, 2019): 1055. http://dx.doi.org/10.30736/jt.v11i1.287.
Full textSun, Xibin, Du Zhang, Haiou Qin, and Jiahua Tang. "Bridging the Last-Mile Gap in Network Security via Generating Intrusion-Specific Detection Patterns through Machine Learning." Security and Communication Networks 2022 (February 12, 2022): 1–20. http://dx.doi.org/10.1155/2022/3990386.
Full textLee, Sung-Yun, and Ki-Yeol Ryu. "Performance Analysis of TCAM-based Jumping Window Algorithm for Snort 2.9.0." Journal of Korean Society for Internet Information 13, no. 2 (April 30, 2012): 41–49. http://dx.doi.org/10.7472/jksii.2012.13.2.41.
Full textAkhriana, Asmah, and Andi Irmayana. "WEB APP PENDETEKSI JENIS SERANGAN JARINGAN KOMPUTER DENGAN MEMANFAATKAN SNORT DAN LOG HONEYPOT." CCIT Journal 12, no. 1 (February 6, 2019): 85–96. http://dx.doi.org/10.33050/ccit.v12i1.604.
Full textSimadiputra, Vincent, and Nico Surantha. "Rasefiberry: Secure and efficient Raspberry-Pi based gateway for smarthome IoT architecture." Bulletin of Electrical Engineering and Informatics 10, no. 2 (April 1, 2021): 1035–45. http://dx.doi.org/10.11591/eei.v10i2.2741.
Full textAlsafasfeh, Moath, and Abdel Ilah Alshbatat. "Configuring Snort as a Firewall on Windows 7 Environment." Journal of Ubiquitous Systems and Pervasive Networks 3, no. 2 (December 15, 2011): 73–77. http://dx.doi.org/10.5383/juspn.03.02.006.
Full text