Abstract
This article aims at presenting a comparative analysis of two intrusion detection and prevention systems, namely Snort and Suricata, run in the af-packet mode in the context of the efficiency of their protection against the denial of service attacks. The paper sets out, in statistical terms, the denial of service attacks and distributed denial-of-service attacks occurring around the world. In the further part of the research, penetration tests were conducted in order to assess comparatively analysis of the efficiency of IDS/IPS systems was carried out in the context of starting various numbers of network connected devices as well as in the case of sending packets with different sizes. This article is addressed to security systems administrators as well as to people involved in security systems implementation.
References
[2] https://dataspace.pl/dos-rodzaje-atakow-cz-2/[Access: 3.09.2015]
[3] https://www.akamai.com/us/en/multimedia/documents/state-of-the-internet/q1-2017-state-of-the-internet-security-executive-summary.pdf [Access: 19.05.2017]
[4] K. Scarfone, P. Mell: Guide to Intrusion Detection and Prevention Systems (IDPS)
[5] http://students.mimuw.edu.pl/SO/Projekt04-05/temat5-g2/sikora-kobylinski/idsips.html [Access: 23.12.2015]
[6] http://sekurak.pl/wprowadzenie-do-systemow-ids/[Access: 23.03.2015]
[7] http://insecure.org/sploits/land.ip.DOS.html[Access: 20.11.1997]
[8] http://www.computerworld.pl/news/291980/Atak.na.sieci.IP.html [Access: 29.12. 1997
[9] https://www.incapsula.com/ddos/attack-glossary/http-flood.html [Access: 18.10.2015]
[10] https://www.incapsula.com/ddos/attack-glossary/syn-flood.html [Access: 18.10.2015]
[11] https://www.debian.org/doc/ [Access: 7.04.2015]
[12] https://www.snort.org/documents/snort-ips-tutorial [Access: 25.08.2015]
[13] https//www.snort.org/documents [Access: 25.08.2015]
[14] https://www.kali.org/kali-linux-documentation/ [Access: 2.01.2016]
[15] http://wiki.hping.org [Access: 30.09.2009]
[16] http://suricata-ids.org/docs/ [Access: 6.08.2014]
[17] Ch. Chapman: Network Performance and Security: Testing and Analyzing Using Open Source and Low-Cost Tools