Afshin Rezakhani Roozbahani, R. Nassiri, G. Latif-Shabgahi
{"title":"Service Oriented Approach to Improve the Power of Snorts","authors":"Afshin Rezakhani Roozbahani, R. Nassiri, G. Latif-Shabgahi","doi":"10.1109/ICCEE.2009.270","DOIUrl":null,"url":null,"abstract":"The major weakness in modern detection methods in the snorts is that the power of snorts is restricted only to the network on which algorithms are applied. This paper presents a new method to solve issues considering locality. We place anomaly detection algorithms that used in snorts in form of services within verified servers. The major advantage of this method is that the former snort strategies can also use possibilities of the new snorts dispersed over the network. We will evaluate this method and show that the resulted traffic is balanced across the Internet.","PeriodicalId":343870,"journal":{"name":"2009 Second International Conference on Computer and Electrical Engineering","volume":"141 ","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 Second International Conference on Computer and Electrical Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCEE.2009.270","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
The major weakness in modern detection methods in the snorts is that the power of snorts is restricted only to the network on which algorithms are applied. This paper presents a new method to solve issues considering locality. We place anomaly detection algorithms that used in snorts in form of services within verified servers. The major advantage of this method is that the former snort strategies can also use possibilities of the new snorts dispersed over the network. We will evaluate this method and show that the resulted traffic is balanced across the Internet.