Mobile Information Systems / 2017 / Article / Tab 11

Research Article

An Enhancement of Optimized Detection Rule of Security Monitoring and Control for Detection of Cyberthreat in Location-Based Mobile System

Table 11

Comparison of Snort Detection Rules and Optimization Options.

Detection rule optionsSnortDetection rule
optimization grammar selection

Header (24/17)
 Rule Actions (8/2)
 Protocols (4/4)
 IP (5/5)
  numeric IPOO
  numeric IP listOO
 Port (4/4)
  static portOO
 Direction (3/2)
Option (47/24)
 Meta Data (6/1)
 Payload Detection (19/12)
  content modifier
 Non Payload Detection (20/9)
 Thresholding (2/2)

Article of the Year Award: Outstanding research contributions of 2020, as selected by our Chief Editors. Read the winning articles.