Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Masters Theses, 2010-2019

Theses/Dissertations

2014

Automated

Articles 1 - 1 of 1

Full-Text Articles in Physical Sciences and Mathematics

Automated Snort Signature Generation, Brandon Rice May 2014

Automated Snort Signature Generation, Brandon Rice

Masters Theses, 2010-2019

Network intrusion systems work on many models, but at their core they rely on algorithms to process data and determine if the network traffic is malicious in nature. Snort is the most widely-used open source network based Intrusion Prevention System / Intrusion Detection System (IPS/IDS) system. It works by comparing network traffic to a list or lists of rules to determine if and what action should be taken. These rules are referred to as signatures, since they are intended to identify a single pattern of network traffic just like a physical signature identifies a single author. I have developed an …