Snort IDPS using Raspberry Pi 4

  • Parag Vadher
N/ACitations
Citations of this article
27Readers
Mendeley users who have this article in their library.

Abstract

Network attacks are becoming increasingly threatening in the age of the wireless. This makes it an imminent hostility against poorly protected networks. The scale and mobility of the Firewalls make security a costly matter for comparatively smaller organizations. In this paper we design and implement a distributed Intrusion Detection Prevention System system with a cost effective Raspberry Pi 4 using Snort Engine. This paper looks to build a portable Intrusion Detection Prevention System using TALOS/VRT Rules. We simulate some attacks to check the security of the Intrusion Detection Prevention System system. Snort community rules and registered rules are a huge part of our project. Some of these tweaked rules are in the custom rules file. Also a part of an economic Intrusion Detection and Prevention System is the Raspberry Pi 4B and PenTBox Honeypot.

Cite

CITATION STYLE

APA

Parag Vadher. (2020). Snort IDPS using Raspberry Pi 4. International Journal of Engineering Research And, V9(07). https://doi.org/10.17577/ijertv9is070099

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free