Performance evaluation of snort under windows 7 and windows server 2008

Khaled Salah, Mojeeb Al Rhman Al-Khiaty, Rashad Ahmed, Adnan Mahdi

Research output: Contribution to journalArticlepeer-review

5 Scopus citations

Abstract

Snort is the most widely deployed network intrusion detection system (NIDS) worldwide, with millions of downloads to date. PC-based Snort typically runs on either Linux or Windows operating systems. In this paper, we present an experimental evaluation and comparison of the performance of Snort NIDS when running under the two newly released operating systems of Windows 7 and Windows Server 2008. Snort's performance is measured when subjecting a PC host running Snort to both normal and malicious traffic. Snort's performance is evaluated and compared in terms of throughput and packet loss. In order to offer sound interpretations and get a better insight into the behaviour of Snort, we also measure the packet loss encountered at the kernel level. In addition, we study the impact of running Snort under different system configurations which include CPU scheduling priority given to user applications or kernel services, uni and multiprocessor environment, and processor affinity.

Original languageBritish English
Pages (from-to)1605-1622
Number of pages18
JournalJournal of Universal Computer Science
Volume17
Issue number11
StatePublished - 2011

Keywords

  • Experimental performance evaluation
  • Network security
  • Operating systems
  • Snort
  • Windows 2008
  • Windows 7

Fingerprint

Dive into the research topics of 'Performance evaluation of snort under windows 7 and windows server 2008'. Together they form a unique fingerprint.

Cite this