<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//TaxonX//DTD Taxonomic Treatment Publishing DTD v0 20100105//EN" "../../nlm/tax-treatment-NS0.dtd">
<article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:tp="http://www.plazi.org/taxpub" article-type="research-article" dtd-version="3.0" xml:lang="en">
  <front>
    <journal-meta>
      <journal-id journal-id-type="publisher-id">109</journal-id>
      <journal-id journal-id-type="index">urn:lsid:arphahub.com:pub:3dc5f44e-8666-58db-bc76-a455210e8891</journal-id>
      <journal-title-group>
        <journal-title xml:lang="en">JUCS - Journal of Universal Computer Science</journal-title>
        <abbrev-journal-title xml:lang="en">jucs</abbrev-journal-title>
      </journal-title-group>
      <issn pub-type="ppub">0948-695X</issn>
      <issn pub-type="epub">0948-6968</issn>
      <publisher>
        <publisher-name>Journal of Universal Computer Science</publisher-name>
      </publisher>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="doi">10.3217/jucs-017-11-1605</article-id>
      <article-id pub-id-type="publisher-id">30010</article-id>
      <article-categories>
        <subj-group subj-group-type="heading">
          <subject>Research Article</subject>
        </subj-group>
        <subj-group subj-group-type="scientific_subject">
          <subject>C.2.0 - General</subject>
          <subject>C.2.1 - Network Architecture and Design</subject>
          <subject>C.2.3 - Network Operations</subject>
          <subject>C.2.6 - Internetworking</subject>
          <subject>C.2.m - Miscellaneous</subject>
          <subject>D.4.0 - General</subject>
          <subject>D.4.6 - Security and Protection</subject>
          <subject>D.4.8 - Performance</subject>
          <subject>D.4.9 - Systems Programs and Utilities</subject>
        </subj-group>
      </article-categories>
      <title-group>
        <article-title>Performance Evaluation of Snort under Windows 7 and Windows Server 2008</article-title>
      </title-group>
      <contrib-group content-type="authors">
        <contrib contrib-type="author" corresp="yes">
          <name name-style="western">
            <surname>Salah</surname>
            <given-names>Khaled</given-names>
          </name>
          <email xlink:type="simple">khaled.salah@kustar.ac.ae</email>
          <xref ref-type="aff" rid="A1">1</xref>
        </contrib>
        <contrib contrib-type="author" corresp="no">
          <name name-style="western">
            <surname>Al-Khiaty</surname>
            <given-names>Mojeeb-Al-Rhman</given-names>
          </name>
          <xref ref-type="aff" rid="A2">2</xref>
        </contrib>
        <contrib contrib-type="author" corresp="no">
          <name name-style="western">
            <surname>Ahmed</surname>
            <given-names>Rashad</given-names>
          </name>
          <xref ref-type="aff" rid="A2">2</xref>
        </contrib>
        <contrib contrib-type="author" corresp="no">
          <name name-style="western">
            <surname>Mahdi</surname>
            <given-names>Adnan</given-names>
          </name>
          <xref ref-type="aff" rid="A2">2</xref>
        </contrib>
      </contrib-group>
      <aff id="A1">
        <label>1</label>
        <addr-line content-type="verbatim">Khalifa University of Science, Sharjah, United Arab Emirates</addr-line>
        <institution>Khalifa University of Science</institution>
        <addr-line content-type="city">Sharjah</addr-line>
        <country>United Arab Emirates</country>
      </aff>
      <aff id="A2">
        <label>2</label>
        <addr-line content-type="verbatim">King Fahd University of Petroleum and Minerals, Dhahran, Saudi Arabia</addr-line>
        <institution>King Fahd University of Petroleum and Minerals</institution>
        <addr-line content-type="city">Dhahran</addr-line>
        <country>Saudi Arabia</country>
      </aff>
      <author-notes>
        <fn fn-type="corresp">
          <p>Corresponding author: Khaled Salah (<email xlink:type="simple">khaled.salah@kustar.ac.ae</email>).</p>
        </fn>
        <fn fn-type="edited-by">
          <p>Academic editor: </p>
        </fn>
      </author-notes>
      <pub-date pub-type="collection">
        <year>2011</year>
      </pub-date>
      <pub-date pub-type="epub">
        <day>01</day>
        <month>07</month>
        <year>2011</year>
      </pub-date>
      <volume>17</volume>
      <issue>11</issue>
      <fpage>1605</fpage>
      <lpage>1622</lpage>
      <uri content-type="arpha" xlink:href="http://openbiodiv.net/8F3CC9D1-3272-57BC-914F-4D5DC3213CC5">8F3CC9D1-3272-57BC-914F-4D5DC3213CC5</uri>
      <uri content-type="zenodo_dep_id" xlink:href="https://zenodo.org/record/7001745">7001745</uri>
      <permissions>
        <copyright-statement>Khaled Salah, Mojeeb-Al-Rhman Al-Khiaty, Rashad Ahmed, Adnan Mahdi</copyright-statement>
        <license license-type="creative-commons-attribution" xlink:href="" xlink:type="simple">
          <license-p>This article is freely available under the J.UCS Open Content License.</license-p>
        </license>
      </permissions>
      <abstract>
        <label>Abstract</label>
        <p>Snort is the most widely deployed network intrusion detection system (NIDS) worldwide, with millions of downloads to date. PC-based Snort typically runs on either Linux or Windows operating systems. In this paper, we present an experimental evaluation and comparison of the performance of Snort NIDS when running under the two newly released operating systems of Windows 7 and Windows Server 2008. Snort's performance is measured when subjecting a PC host running Snort to both normal and malicious traffic. Snort's performance is evaluated and compared in terms of throughput and packet loss. In order to offer sound interpretations and get a better insight into the behaviour of Snort, we also measure the packet loss encountered at the kernel level. In addition, we study the impact of running Snort under different system configurations which include CPU scheduling priority given to user applications or kernel services, uni and multiprocessor environment, and processor affinity.</p>
      </abstract>
    </article-meta>
  </front>
</article>
