Afficher la notice abrégée
dc.contributor.author |
Ould Bechiry, Abdallah |
|
dc.date.accessioned |
2022-05-12T10:18:12Z |
|
dc.date.available |
2022-05-12T10:18:12Z |
|
dc.date.issued |
2021 |
|
dc.identifier.uri |
https://di.univ-blida.dz/jspui/handle/123456789/15892 |
|
dc.description |
ill., Bibliogr. |
fr_FR |
dc.description.abstract |
Intrusion detection system is a well known security tool, used by companies
to protect their resources and the services they provid from the massive amout of
computer threats these companies are a potential targets for. In this thesis we try
to shed some light on the importance, advantages and disadvantages of IDSs then
we will focus on one of these diadvantages which is the rate of false positive alerts
in an IDS. We chose to work with an open sorce IDS called snort. The approach
we are taking in order to minimize the rate of false positives is to consider the
cotext changes on the protected network like trusted devices inside the network,
network packet timing, which device initiated the comunication..etc. We desinged
our filtering software that takes said context changes inside the network we layed out
as a test bed into consideration. We used wireshark to capture network packets and
passed them to snort to detect any intrusion that may have happened. Snort then
outputs log files containing alerts about any suspicious packets, we then input these
files into our software which analyses the IDS logs in order to filter the false alerts.
We intentionally attacked our network through a known vulnerability to ensure that
some of the packets were malicious and to test that our software does not filter the
alerts generated by the IDS conserning the packets related to this attack. we found
segnificant diffrence in the number of alerts before and after filtering. The process
and results are all mentioned and detailed in the core of this thesis.
Keywords
IDS, Snort, Network packets, Alert, Context, False positive, Filter, Intrusion,
Detection, Attack, Threat. |
fr_FR |
dc.language.iso |
en |
fr_FR |
dc.publisher |
Université Blida 1 |
fr_FR |
dc.subject |
IDS |
fr_FR |
dc.subject |
Snort |
fr_FR |
dc.subject |
Network packets |
fr_FR |
dc.subject |
Alert |
fr_FR |
dc.subject |
Context |
fr_FR |
dc.subject |
False positive |
fr_FR |
dc.subject |
Filter |
fr_FR |
dc.subject |
Intrusion |
fr_FR |
dc.subject |
Detection |
fr_FR |
dc.subject |
Attack |
fr_FR |
dc.subject |
Threat |
fr_FR |
dc.title |
Minimizing the rate of false positives in Intrusion Detection Systems by considering the context changes |
fr_FR |
dc.type |
Thesis |
fr_FR |
Fichier(s) constituant ce document
Ce document figure dans la(les) collection(s) suivante(s)
Afficher la notice abrégée