Filters








1,307 Hits in 7.0 sec

A High-Throughput System Architecture for Deep Packet Filtering in Network Intrusion Prevention [chapter]

Dae Y. Kim, Sunil Kim, Lynn Choi, Hyogon Kim
2006 Lecture Notes in Computer Science  
Pattern matching is one of critical parts of Network Intrusion Prevention Systems (NIPS). Pattern matching hardware for NIPS should find a matching pattern at wire speed.  ...  We modify Shift-OR hardware accelerator and propose a system architectures to meet the above requirement.  ...  Conclusion In Network Intrusion Prevention Systems (NIPS), pattern matching is extensively used to find attack signatures in a payload and is the most computationally intensive part of the execution.  ... 
doi:10.1007/11682127_29 fatcat:v5tqtw7cnzbmtkqsrabqag2x4u

SANS

Fei He, Yaxuan Qi, Yibo Xue, Jun Li
2009 Proceedings of the 5th ACM/IEEE Symposium on Architectures for Networking and Communications Systems - ANCS '09  
Inline stateful and deep inspection for intrusion prevention is becoming more challenging due to the increase in both the volume of network traffic and the complexity of the analysis requirements.  ...  In this work, we pursue a novel architectural approach, named SANS, which takes both the advantage of new generation network processors for packet-header-based processing and the advantage of commodity  ...  INTRODUCTION The difficulties of building high performance network intrusion prevention systems (NIPS) stem mainly from the fact that NIPS needs to analyze not only packet headers but also packet payload  ... 
doi:10.1145/1882486.1882532 dblp:conf/ancs/HeQXL09 fatcat:oefjfqg35rbjhbjj5ea2jg7od4

A Survey on Deep Packet Inspection for Intrusion Detection Systems [article]

Tamer AbuHmed, Abedelaziz Mohaisen, DaeHun Nyang
2008 arXiv   pre-print
Deep packet inspection is widely recognized as a powerful way which is used for intrusion detection systems for inspecting, deterring and deflecting malicious attacks over the network.  ...  In this paper, we survey the deep packet inspection implementations techniques, research challenges and algorithms. Finally, we provide a comparison between the different applied systems.  ...  , high performance firewall functions and finally in network intrusion detection system (NIDS) and network prevention system (NIPS) that depend on DPI techniques.  ... 
arXiv:0803.0037v1 fatcat:5smjxqskfrejnity326r6rjxgu

GDPI: Signature based Deep Packet Inspection using GPUs

Nausheen Shoaib, Jawwad Shamsi, Tahir Mustafa, Akhter Zaman, Jazib ul, Mishal Gohar
2017 International Journal of Advanced Computer Science and Applications  
Deep Packet Inspection (DPI) is necessitated for many networked application systems in order to prevent from cyber threats.  ...  The signature based Network Intrusion and Detection System (NIDS) works on packet inspection and pattern matching mechanisms for the detection of malicious content in network traffic.  ...  High Performance Intrusion Detection Network Intrusion Detection systems (NIDS) are well known source for monitoring inbound and outbound network traffics in order to prevent from DDOS and other types  ... 
doi:10.14569/ijacsa.2017.081128 fatcat:hrzim6u7efaedjvinb3luumfqe

High performance encrypted network traffic inspection using hardware accelerators

Eva Papadogiannaki, Giorgos Vasiliadis, Sotiris Ioannidis
2018 Zenodo  
Poster presented at the 14th International Conference on emerging Networking EXperiments and Technologies (CoNEXT 2018).  ...  • Preprocesses patterns to build a state machine • Simultaneous multipattern searching • Processes the input in a single pass • Pattern searching can be transferred to GPU to achieve high throughput  ...  This framework can be used to build different network related applications, such as firewalls, L7 filtering, or an Intrusion Detection System. The signatures are processed into an automaton.  ... 
doi:10.5281/zenodo.2635459 fatcat:hbj2pgy4bfgsjjb73vsoxnjq5q

IP routing processing with graphic processors

Shuai Mu, Xinya Zhang, Nairen Zhang, Jiaxin Lu, Yangdong Steve Deng, Shu Zhang
2010 2010 Design, Automation & Test in Europe Conference & Exhibition (DATE 2010)  
For the deep packet inspection application, we implemented both a Bloom-filter based string matching algorithm and a finite automata based regular expression matching algorithm.  ...  Current high performance routers depend on proprietary hardware solutions, which make it difficult to adapt to ever-changing network protocols.  ...  [24] reported that signature matching alone accounts for approximately 60% of the processing time in the Snort Intrusion Prevention System [2] .  ... 
doi:10.1109/date.2010.5457229 dblp:conf/date/MuZZLDZ10 fatcat:lptjskmrzbddxirs4ighke3oqe

Implementing Intrusion Detection System for Multicore Processor

Rajeswari G., Nithya B.
2009 2009 International Conference on Advances in Recent Technologies in Communication and Computing  
In this paper, we present new architecture for multi-core supported Intrusion Detection System, which aims at providing network security processing without causing performance penalty to normal network  ...  The Intrusion Detection System that we Presented in this paper also protect the multi core systems from Real Time attacks and Packet Filtrations with high performance without any penalty.  ...  Shallow packet inspection is a form of computer network packet filtering that examines only the header part of a packet.  ... 
doi:10.1109/artcom.2009.44 dblp:conf/artcom/RajeswariN09 fatcat:nbc6yirovvhizidphczu22e7ay

GPU-accelerated encrypted network traffic inspection

Eva Papadogiannaki, Sotiris Ioannidis
2019 Zenodo  
Common applications of DPI include but are not limited to firewalls, intrusion detection and prevention systems, L7 filtering and packet forwarding.  ...  Traditional DPI implementations can only extract very coarse-grained information for the majority of encrypted traffic, even though its analysis is a core operation for many network systems.  ...  Common applications of DPI include but are not limited to firewalls, intrusion detection and prevention systems, L7 filtering and packet forwarding.  ... 
doi:10.5281/zenodo.3472928 fatcat:zcc2hou37jdrnj4xzdjgtpajoa

WISDOM

Elias Athanasopoulos, Antonis Krithinakis, Georgios Kopidakis, Graeme Maxwell, Alistair Poustie, Bob Manning, Rod Webb, Martin Koyabe, Carla Di Cairano-Gilfedder
2009 Proceedings of the Second European Workshop on System Security - EUROSEC '09  
We outline application scenarios in which a hybrid architecture of optical and digital parts, like the one we propose in this paper, can offer significant benefit to the network from a security perspective  ...  A very fast network composed by not as fast processors is unable to perform basic operations needed in the security field, like firewalling and intrusion detection.  ...  ACKNOWLEDGEMENTS We thank the anonymous reviewers for their valuable comments. We would also like to thank Lubomir Stroetmann, who contributed to this project while interning with FORTH.  ... 
doi:10.1145/1519144.1519148 dblp:conf/eurosec/AthanasopoulosKKMPMWKC09 fatcat:zqkqk4hgxngbpmcihx7nsj2bqm

Hardware Architecture of a Parallel Pattern Matching Engine

Meeta Yadav, Ashwini Venkatachaliah, Paul D. Franzon
2007 2007 IEEE International Symposium on Circuits and Systems  
Several network security and QoS applications require detecting multiple string matches in the packet payload by comparing it against predefined pattern set.  ...  recover from a failed partial match, the throughput of the system does not degrade with the increase in the number of patterns or the length of the patterns to be matched.  ...  Several networking applications like Network Intrusion Detection Systems (NIDS), Network Intrusion Prevention Systems (NIPS) and Packet Classifiers (PC) perform deep packet inspection to analyze the packet  ... 
doi:10.1109/iscas.2007.378482 dblp:conf/iscas/YadavVF07 fatcat:hlvwhbn53bexnhju4bsdvyi3aa

MULTI-GIGABIT PATTERN FOR DATA IN NETWORK SECURITY

Praveen Kumar . Ch, Prof.P.Vijai Bhaskar, Ravi. Ch, B.Rambhupal Reddy
2013 International journal of computer and communication technology  
High-speed network intrusion detection systems (IDS) rely on efficient pattern matching techniques to analyze the packet payload and make decisions on the significance of the packet body.  ...  Various techniques have been proposed in past but the performance of the system is reducing because of multi-gigabit rates.Pattern matching is a significant issue in intrusion detection systems, but by  ...  Inline intrusion detection system or Intrusion Prevention System (IPS) actively filters exploits from traffic in real time.  ... 
doi:10.47893/ijcct.2013.1204 fatcat:jx6ewq2me5dyrihyy4zpmkanj4

Novel three-Tier Intrusion Detection and Prevention System in Software Defined Network

Amir Ali, Muhammad Murtaza Yousaf
2020 IEEE Access  
For more information, see https://creativecommons.org/licenses/by/4.0/ VOLUME 8, 2020 A. Ali, M. M. Yousaf: Novel Three-Tier Intrusion Detection and Prevention System in SDN  ...  INDEX TERMS SDN security, IoT, intrusion prevention system, RFID, packet classification. 109662 This work is licensed under a Creative Commons Attribution 4.0 License.  ...  Hence the need for intrusion detection and prevention system (IDPS) was increased to detect and mitigate the activities of malicious flows [23] .  ... 
doi:10.1109/access.2020.3002333 fatcat:4ijmba3l55amroazlz6vopei4i

Acceleration of Intrusion Detection in Encrypted Network Traffic Using Heterogeneous Hardware

Eva Papadogiannaki, Sotiris Ioannidis
2021 Sensors  
In this work, we present HeaderHunter, a fast signature-based intrusion detection system even for encrypted network traffic.  ...  Common applications for DPI include but are not limited to firewalls, intrusion detection and prevention systems, L7 filtering, and packet forwarding.  ...  This publication reflects the views only of the authors, and the Commission cannot be held responsible for any use which may be made of the information contained therein.  ... 
doi:10.3390/s21041140 pmid:33562000 fatcat:cfsytoioujeohglyusbem76ygy

Guest Editorial Deep Packet Inspection: Algorithms, Hardware, and Applications

Ying-Dar Lin, Po-Ching Lin, Viktor K. Prasanna, H. Jonathan Chao, John W. Lockwood
2014 IEEE Journal on Selected Areas in Communications  
Furthermore, the solutions usually should operate in real time in a high-speed network, while dealing with the above complexity.  ...  D EEP packet inspection (DPI) examines the content in packet payloads to search for signatures of network applications, signs of malicious activities, and leaks of sensitive information, rather than just  ...  The paper "TFA: A Tunable Finite Automaton for Pattern Matching in Network Intrusion Detection Systems" by Yang Xu, Junchen Jiang, Rihua Wei, Yang Song, and H.  ... 
doi:10.1109/jsac.2014.2371093 fatcat:ze5m5gzosvhbjgyrp63pen5rta

Regular Expression Matching on Graphics Hardware for Intrusion Detection [chapter]

Giorgos Vasiliadis, Michalis Polychronakis, Spiros Antonatos, Evangelos P. Markatos, Sotiris Ioannidis
2009 Lecture Notes in Computer Science  
The expressive power of regular expressions has been often exploited in network intrusion detection systems, virus scanners, and spam filtering applications.  ...  We demonstrate the feasibility of GPU regular expression matching by implementing it in the popular Snort intrusion detection system, which results to a 60% increase in the packet processing throughput  ...  Acknowledgments This work was supported in part by the Marie Curie Actions -Reintegration Grants project PASS. Giorgos Vasiliadis, Michalis Polychronakis, Spiros Antonatos, Evangelos P.  ... 
doi:10.1007/978-3-642-04342-0_14 fatcat:tltn2m5vijf2xkb2b2zrws74ke
« Previous Showing results 1 — 15 out of 1,307 results