Analysis of Traffic Using the Snort Tool for the Detection of Malware Traffic

https://doi.org/10.55529/ijitc.33.30.37

Authors

  • Abdul Rasul AL Waili Faculty of Education, Wasit University, Iraq

Keywords:

Malware Detection, Traffic Analysis, Snort, Intrusion Detection System, Network Security.

Abstract

The increasing prevalence of malware threats necessitates the development of robust methods for detecting and mitigating malicious network traffic. This paper presents an analysis of traffic using the Snort tool for the detection of malware traffic. The study focuses on understanding traffic patterns, evaluating Snort's performance, and comparing it with other tools or methods for malware detection. The methodology involves data collection, preprocessing, Snort configuration, and traffic analysis. The results reveal valuable insights into traffic patterns associated with malware activities, demonstrate Snort's effectiveness in detecting known malware signatures, and assess its efficiency and scalability. The comparison with other tools provides a comprehensive understanding of Snort's strengths and limitations. This research contributes to the field of network security by providing practical insights for network administrators and suggesting future research directions.

Published

2023-05-23

How to Cite

Abdul Rasul AL Waili. (2023). Analysis of Traffic Using the Snort Tool for the Detection of Malware Traffic. International Journal of Information Technology & Computer Engineering , 3(03), 30–37. https://doi.org/10.55529/ijitc.33.30.37

Issue

Section

Aricle Publication

Similar Articles

1 2 3 4 5 6 7 > >> 

You may also start an advanced similarity search for this article.