Performance Evaluation in High-Speed Networks by the Example of Intrusion Detection
Thomas Lukaseder,J. Fiedler,F. Kargl
TLDR
The approach is used and its applicability is shown in an evaluation of two of the most well-known and common open source intrusion detection systems, Snort and Suricata, focusing on accuracy of the detection especially dependent on bandwidth.
Abstract
Purchase decisions for devices in high-throughput networks as well as scientific evaluations of algorithms and technologies need to be based in measurements and clear procedures. Therefore, evaluation of network devices and their performance in high-throughput networks is an important part of research. In this paper, we document our approach and show its applicability for our purpose in an evaluation of two of the most well-known and common open source intrusion detection systems, Snort and Suricata. We used a hardware network testing setup to ensure a realistic environment and documented our testing approach. In our work, we focus on accuracy of the detection especially dependent on bandwidth. We would like to pass on our experiences and considerations.
