Managing Network Security with Snort Open Source Intrusion Detection Tools

dc.creatorLawal, B. O., Okesola, J. O.
dc.date2014
dc.date.accessioned2025-04-01T16:05:41Z
dc.descriptionOrganizations both large and small are constantly looking to improve their posture on security. Hackers and intruders have made many successful attempts to bring down high-profile company networks and web services for lack of adequate security. Many methods have been developed to secure the network infrastructure and communication over the Internet such as the firewall and intrusion detection systems. While most organizations deploy security equipment, they still encounter the challenge of monitoring and reviewing the security events. There are various intrusion detection tools in the market for free. Also, there are multiple ways to detect these attacks and vulnerabilities from being exploited and leaking corporate data on the internet. One method involves using intrusion detection systems to detect the attack and block or alert the appropriate staff of the attack. Snort contains a suite of tools that aids the administrators in detecting these events. In this paper, Snort IDS was analysed on how it manages the network from installation to deployment with additional tools that helps to analyse the security data. The components and rules to operate Snort were also discussed. As with other IDS it has advantages and disadvantages.
dc.formatapplication/pdf
dc.identifierhttp://eprints.covenantuniversity.edu.ng/10408/
dc.identifier.urihttps://repository.covenantuniversity.edu.ng/handle/123456789/39892
dc.languageen
dc.subjectQA75 Electronic computers. Computer science
dc.titleManaging Network Security with Snort Open Source Intrusion Detection Tools
dc.typeConference or Workshop Item

Files

Original bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
MANAGING NETWORK SECURITY WITH SNORT OPEN SOURCE INTRUSION DETECTION TOOLS.pdf
Size:
517.2 KB
Format:
Adobe Portable Document Format

Collections