Nothing Special   »   [go: up one dir, main page]

Al-Dalky et al., 2014 - Google Patents

Accelerating snort NIDS using NetFPGA-based Bloom filter

Al-Dalky et al., 2014

Document ID
13755706870311375793
Author
Al-Dalky R
Salah K
Otrok H
Al-Qutayri M
Publication year
Publication venue
2014 International Wireless Communications and Mobile Computing Conference (IWCMC)

External Links

Snippet

In recent years, network intrusion detection systems (NIDS) have faced a serious throughput challenge as a result of the rapid increase of network links to 1 and 10 Gbps rates. Consequently, this calls for NIDS to have wire-speed packet processing and real-time …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/74Address processing for routing
    • H04L45/745Address table lookup or address filtering
    • H04L45/7453Address table lookup or address filtering using hashing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • H04L63/0245Filtering by information in the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing packet switching networks
    • H04L43/02Arrangements for monitoring or testing packet switching networks involving a reduction of monitoring data
    • H04L43/026Arrangements for monitoring or testing packet switching networks involving a reduction of monitoring data using flow generation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • H04L63/0218Distributed architectures, e.g. distributed firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic regulation in packet switching networks
    • H04L47/10Flow control or congestion control
    • H04L47/24Flow control or congestion control depending on the type of traffic, e.g. priority or quality of service [QoS]
    • H04L47/2441Flow classification
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Application independent communication protocol aspects or techniques in packet data networks
    • H04L69/22Header parsing or analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Application independent communication protocol aspects or techniques in packet data networks
    • H04L69/12Protocol engines, e.g. VLSIs or transputers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L49/00Packet switching elements

Similar Documents

Publication Publication Date Title
Clark et al. A hardware platform for network intrusion detection and prevention
Chen et al. A survey on the application of FPGAs for network infrastructure security
US7586851B2 (en) Programmable packet parsing processor
Cheng et al. Machine learning based low-rate DDoS attack detection for SDN enabled IoT networks
Yu High speed deep packet inspection with hardware support
AU2010322819B2 (en) Processing network traffic
US8131841B2 (en) Method and apparatus for detecting predefined signatures in packet payload
Hu et al. Analysing performance issues of open-source intrusion detection systems in high-speed networks
Bakhtiar et al. A lightweight ids based on J48 algorithm for detecting dos attacks on IoT Middleware
Al-Dalky et al. Accelerating snort NIDS using NetFPGA-based Bloom filter
Zheng et al. Algorithms to speedup pattern matching for network intrusion detection systems
US10944724B2 (en) Accelerating computer network policy search
Gupta et al. A categorical survey of state-of-the-art intrusion detection system-Snort
Xie et al. Soter: Deep learning enhanced in-network attack detection based on programmable switches
Karimov et al. Problems of increasing efficiency of NIDS by using implementing methods packet classifications on FPGA
Liu et al. Fast and memory-efficient traffic classification with deep packet inspection in CMP architecture
Gray et al. High performance network metadata extraction using P4 for ML-based intrusion detection systems
Chen et al. Ac-suffix-tree: Buffer free string matching on out-of-sequence packets
Tharaka et al. Runtime rule-reconfigurable high throughput NIPS on FPGA
CN116264520A (en) Artificial intelligence supported network telemetry using data processing units
Gallo et al. FENXI: Deep-learning Traffic Analytics at the edge
Al-Dalky et al. Framework for a NetFPGA-based Snort NIDS
Shenoy et al. Improving the performance efficiency of an ids by exploiting temporal locality in network traffic
Schuff et al. Design alternatives for a high-performance self-securing ethernet network interface
Wan et al. Multi-core processors based network intrusion detection method