Главная
Study mode:
on
1
Introduction
2
Hostbased IDS
3
Networkbased IDS
4
Goals
5
Overview
6
Pitbull
7
Pitbull Modules
8
Gathering Data
9
Test Environment
10
Virtual Environments
11
Virtual Machine Configuration
12
Results
13
Test Rules
14
Test Rules Results
15
Denial of Service
16
Alerts
17
Investigating
18
Apache Bench Test
19
Apache Circuit Alerts
20
Disk Usage
21
Hardware
22
Number of Alerts
23
CPU Usage
24
Packet Drops
25
Summary
26
Conclusion
27
Questions
Description:
Explore the performance of Intrusion Detection Systems (IDS) in constrained environments through this 46-minute conference talk by Shelton Wright from the University of Alabama Huntsville's Center for Cybersecurity Research and Education. Delve into host-based and network-based IDS, focusing on the Pitbull system and its modules. Examine data gathering techniques, test environments, and virtual machine configurations. Analyze test results, including denial of service scenarios, alerts, and Apache circuit alerts. Investigate the impact on hardware resources, such as disk usage, CPU usage, and packet drops. Gain valuable insights into IDS performance optimization for resource-limited settings.

IDS Performance in Constrained Environments

CAE in Cybersecurity Community
Add to list