Filters








18,077 Hits in 3.4 sec

Data Packet Processing Model based on Multi-Core Architecture

Xian Zhang
2018 International Journal of Performability Engineering  
According to the characteristics of pipeline structure and multi-core processor structure for packet processing in network detection applications, the horizontal-based parallel architecture model and tree-based  ...  parallel architecture model are proposed for packet processing of Snort application.  ...  Acknowledgements The research was supported by the Education Department of Hunan Province (17C1267) and the Huaihua Science and Technology Agency Project (2017N2207).  ... 
doi:10.23940/ijpe.18.07.p1.13831390 fatcat:4flik2anyjf2bjaomndflc3che

Research on Packet-Processing Architecture Based on Multi-core Processor

Wang Ying
2014 2014 Sixth International Conference on Measuring Technology and Mechatronics Automation  
According to the characteristics of pipeline structure and multi-core processor structure for packet processing in network detection applications, the horizontal-based parallel architecture model and tree-based  ...  parallel architecture model are proposed for packet processing of Snort application.  ...  Acknowledgements The research was supported by the Education Department of Hunan Province (17C1267) and the Huaihua Science and Technology Agency Project (2017N2207).  ... 
doi:10.1109/icmtma.2014.126 fatcat:gmvxi6b2ejh77khnokcv22qxcq

A Survey of parallel intrusion detection on graphical processors

Liberios Vokorokos, Michal Ennert, Marek >Čajkovský, Ján Radušovský
2014 Open Computer Science  
The most common technique transformed into GPU is the technique of pattern matching. There is a number of intrusion detection tools using GPU tested in real network traffic.  ...  There are many detection techniques but only some of them bring advantages of parallel computing implementation to graphical processors (GPU).  ...  APVV-0008-10, APVV-0073-07 and KEGA 008TUKE-4/2013 Microlearning environment for education of information security specialists.  ... 
doi:10.2478/s13537-014-0213-6 fatcat:q2ihwx4pkzaajjozlr2u4yaj2y

A reconfigurable architecture for network intrusion detection using principal component analysis

David T. Nguyen, Gokhan Memik, Alok Choudhary
2006 Proceedings of the internation symposium on Field programmable gate arrays - FPGA'06  
In this paper, we develop an architecture for principal component analysis (PCA) to be used as an outlier detection method for high-speed network intrusion detection systems (NIDS).  ...  For next generation NIDS, anomaly detection methods must satisfy the demands of Gigabit Ethernet.  ...  Figure 1 : 1 Principal Component Analysis for Network Intrusion Detection Figure 2 : 2 Detection & False Alarm Rate vs. q Offline Phase of Principal Component Analysis Mean Vector Correlation Matrix  ... 
doi:10.1145/1117201.1117262 dblp:conf/fpga/NguyenMC06 fatcat:icou4tbqlvhffpdyiqwohm7mqm

Parallel Component Agent Architecture to Improve the Efficiency of Signature Based NIDS

Hafiz Gulfam Ahmad Umar, Chuandong Li, Zeeshan Ahmad
2014 Journal of Advances in Computer Networks  
Intrusion detection system (IDS) is the basic component of any network defense scheme. Different IDS use several techniques for Intrusion detection.  ...  Signature base detection techniques are widely used in networks for fast response to detect threats.  ...  The authors are also thankful to all the reviewers for their kind guidance to make this work more perfect.  ... 
doi:10.7763/jacn.2014.v2.124 fatcat:a64go23wynerpcr5scgj7k2beu

Intrusion Detection Architecture Utilizing Graphics Processors

Liberios Vokorokos, Anton Baláž, Branislav Madoš
2012 Acta Informatica Pragensia  
This paper examines perceptions of intrusion detection architecture implementation, resulting from the use of graphics processor.  ...  The focus is on how knowledge experienced throughout the graphics processor inclusion has played out in the design of intrusion detection architecture that is seen as an opportunity to strengthen research  ...  The next function of the architecture is to use GPU and CPU for the network traffic analysis. The architecture also includes database, which is used for storage of the Suricata outputs.  ... 
doi:10.18267/j.aip.5 fatcat:2nyquhcp5jahbcrbyb3h3gbiy4

A Comprehensive Survey of Technologies for Building a Hybrid High Performance Intrusion Detection System

S. J.SathishAaronJoseph, R.Balasubramanian R.Balasubramanian
2015 International Journal of Computer Applications  
Intrusion detection plays a vital role in maintaining the stability of any network.  ...  This paper presents a comprehensive survey of the technologies that are used for detecting intrusions.  ...  This concept can be directly applied to the process of intrusion detection to perform effective analysis of the intrusions occurring in the network.  ... 
doi:10.5120/19904-2015 fatcat:d5sbwg2iozfk3niiz2izq3tlzq

Using a Cluster for Securing Embedded Systems

Mohamed Salim, Khalid BOUKHDIR, Hicham MEDROMI, Siham BENHADOU
2016 International Journal of Advanced Computer Science and Applications  
In today's increasingly interconnected world, the deployment of an Intrusion Detection System (IDS) is becoming very important for securing embedded systems from viruses, worms, attacks, etc.  ...  To test the feasibility of our proposed architecture, we run two instances of the Bro IDS on two Raspberry Pi.  ...  INTRODUCTION Intrusion Detection Systems (IDS) were used for many years to protect networks and hosts.  ... 
doi:10.14569/ijacsa.2016.070923 fatcat:6uqqs62yuzctlgjkesdfr5l3pe

Implementing Intrusion Detection System for Multicore Processor

Rajeswari G., Nithya B.
2009 2009 International Conference on Advances in Recent Technologies in Communication and Computing  
In this paper, we present new architecture for multi-core supported Intrusion Detection System, which aims at providing network security processing without causing performance penalty to normal network  ...  The Intrusion Detection System that we Presented in this paper also protect the multi core systems from Real Time attacks and Packet Filtrations with high performance without any penalty.  ...  We incorporate the system architecture into an intrusion detection system. Intrusion detection techniques can be classified into two categories: signature matching and anomaly detection.  ... 
doi:10.1109/artcom.2009.44 dblp:conf/artcom/RajeswariN09 fatcat:nbc6yirovvhizidphczu22e7ay

An Efficient FPGA Implementation of Principle Component Analysis based Network Intrusion Detection System

Abhishek Das, Sanchit Misra, Sumeet Joshi, Joseph Zambreno, Gokhan Memik, Alok Choudhary
2008 2008 Design, Automation and Test in Europe  
In this paper, we design and implement an efficient FPGA architecture for Principal Component Analysis to be used in NIDSs.  ...  Moreover, using representative network intrusion traces, we show that our architecture correctly classifies attacks with detection rates exceeding 99.9% and false alarm rates as low as 1.95%.  ...  We develop such an architecture and utilize it for network intrusion detection.  ... 
doi:10.1109/date.2008.4484835 dblp:conf/date/DasMJZMC08 fatcat:2r3kyy6wyjcatpfumgx6dgvn4a

An efficient FPGA implementation of principle component analysis based network intrusion detection system

Abhishek Das, Sanchit Misra, Sumeet Joshi, Joseph Zambreno, Gokhan Memik, Alok Choudhary
2008 Proceedings of the conference on Design, automation and test in Europe - DATE '08  
In this paper, we design and implement an efficient FPGA architecture for Principal Component Analysis to be used in NIDSs.  ...  Moreover, using representative network intrusion traces, we show that our architecture correctly classifies attacks with detection rates exceeding 99.9% and false alarm rates as low as 1.95%.  ...  We develop such an architecture and utilize it for network intrusion detection.  ... 
doi:10.1145/1403375.1403658 fatcat:vy2mambim5hbjawkbyoweikrkm

Enhancing interoperability and stateful analysis of cooperative network intrusion detection systems

Michele Colajanni, Daniele Gozzi, Mirco Marchetti
2007 Proceedings of the 3rd ACM/IEEE Symposium on Architecture for networking and communications systems - ANCS '07  
A traditional Network Intrusion Detection System (NIDS) is based on a centralized architecture that does not satisfy the needs of most modern network infrastructures characterized by high traffic volumes  ...  The advanced functionalities and performance of the proposed cooperative framework for network intrusion detection systems are demonstrated through a fully operative prototype.  ...  For example, the same framework can be utilized to create a parallel NIDS architecture, where load balancing adjustments of network traffic are followed by the transfer of detection state data [4] .  ... 
doi:10.1145/1323548.1323576 dblp:conf/ancs/ColajanniGM07 fatcat:sb5oufupjbbz7j75pok2birjie

Network intrusion detection using hardware techniques: A review

Razan Abdulhammed, Miad Faezipour, Khaled M. Elleithy
2016 2016 IEEE Long Island Systems, Applications and Technology Conference (LISAT)  
The increasing amount of network throughput and security threat makes intrusion detection a major research problem.  ...  Our approach to classify modern hardware-based Intrusion Detection System (IDS) techniques is based on the detection approach.  ...  TCAM that is a packet classification architecture based on FPGA for network intrusion detection.  ... 
doi:10.1109/lisat.2016.7494100 fatcat:z2a5na5margvvhybu7qpy4yaqm

An FPGA-Based Network Intrusion Detection Architecture

Abhishek Das, David Nguyen, Joseph Zambreno, Gokhan Memik, Alok Choudhary
2008 IEEE Transactions on Information Forensics and Security  
Network intrusion detection systems (NIDSs) monitor network traffic for suspicious activity and alert the system or network administrator.  ...  In this work, we design an FPGA-based architecture for anomaly detection in network transmissions.  ...  Ögrenci Memik for her helpful comments and suggestions pertaining to this work.  ... 
doi:10.1109/tifs.2007.916288 fatcat:iphbnvixazgnzfflyinzmpr6fm

A Parallel Architecture for Stateful, High-Speed Intrusion Detection [chapter]

Luca Foschini, Ashish V. Thapliyal, Lorenzo Cavallaro, Christopher Kruegel, Giovanni Vigna
2008 Lecture Notes in Computer Science  
We present a novel parallel matching algorithm for the signature-based detection of network attacks.  ...  Our initial experiments confirm that, by making the rule matching process parallel, it is possible to achieve a scalable implementation of a stateful, network-based intrusion detection system.  ...  A parallel architecture for intrusion detection should help lower the processing power demand and the memory footprint of packet analysis by distributing the network traffic to be analyzed among different  ... 
doi:10.1007/978-3-540-89862-7_18 fatcat:r6ysodmtvrcbhesalvlbfehjky
« Previous Showing results 1 — 15 out of 18,077 results