<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Bartłomiej Gdowski</style></author><author><style face="normal" font="default" size="100%">Rafał Kościej</style></author><author><style face="normal" font="default" size="100%">Marcin Niemiec</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Heuristic-based Intrusion Detection Functionality in a Snort Environment</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">heuristic algorithm</style></keyword><keyword><style  face="normal" font="default" size="100%">intrusion detection</style></keyword><keyword><style  face="normal" font="default" size="100%">network attack</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2021</style></year></dates><volume><style face="normal" font="default" size="100%">50</style></volume><pages><style face="normal" font="default" size="100%">23-36 </style></pages><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;margin-left:19.85pt;&quot;&gt;This article provides an introduction to intrusion detection systems, focusing on extending the Snort environment&amp;rsquo;s functionalities by adding a new heuristic detection algorithm. The algorithm allows to detect selected types of cyberattacks through analysis of received packets and based on a list of malicious Internet Protocol addresses. Furthermore, the algorithm underwent functional verification. The results confirmed that the algorithm successfully detects the packets originating from the provided list and rates them accordingly.&lt;/p&gt;</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue></record></records></xml>