Active Snort Rules and the Needs for Computing Resources: Computing Resources Needed to Activate Different Numbers of Snort Rules.
Chad A. ArneyXinli WangPublished in: RIIT (2016)
Keyphrases
- computing resources
- cloud computing
- limited resources
- resource management
- grid computing
- network bandwidth
- virtual machine
- geographically distributed
- association rules
- network intrusion detection
- active databases
- high performance computing
- network resources
- intrusion detection system
- distributed computing
- classification rules
- rule sets
- cooperative
- load balance
- multi core processors
- eca rules