Accelerated deep neural networks for enhanced intrusion detection system

S Potluri, C Diedrich - 2016 IEEE 21st international conference …, 2016 - ieeexplore.ieee.org
Network based communication is more vulnerable to outsider and insider attacks in recent
days due to its wide spread applications in many fields. Intrusion Detection System (IDS) a …

[BOOK][B] The state of the art in intrusion prevention and detection

ASK Pathan - 2014 - api.taylorfrancis.com
Most of the security threats in various communications networks are posed by the illegitimate
entities that enter or intrude within the network perimeter, which could commonly be termed …

MIDeA: a multi-parallel intrusion detection architecture

G Vasiliadis, M Polychronakis, S Ioannidis - Proceedings of the 18th …, 2011 - dl.acm.org
Network intrusion detection systems are faced with the challenge of identifying diverse
attacks, in extremely high speed networks. For this reason, they must operate at multi …

IoT-based fall detection for smart home environments

S Greene, H Thapliyal… - 2016 IEEE international …, 2016 - ieeexplore.ieee.org
The rise of internet connected devices has enabledthe home with a vast amount of
enhancements to make lifemore convenient. These internet connected devices can be used …

[HTML][HTML] A dynamic and scalable parallel Network Intrusion Detection System using intelligent rule ordering and Network Function Virtualization

H Haugerud, HN Tran, N Aitsaadi, A Yazidi - Future Generation Computer …, 2021 - Elsevier
Abstract A Network Intrusion Detection System (NIDS) is a fundamental security tool.
However, under heavy network traffic, a NIDS might become a bottleneck. In an overloaded …

Flow-based approach to detect abnormal behavior in neighbor discovery protocol (NDP)

AA Bahashwan, M Anbar, IH Hasbullah… - IEEE …, 2021 - ieeexplore.ieee.org
Internet Protocol version six (IPv6) is equipped with new protocols, such as the Neighbor
Discovery Protocol (NDP). NDP is a stateless protocol without authentication that makes it …

Beyond pattern matching: A concurrency model for stateful deep packet inspection

L De Carli, R Sommer, S Jha - Proceedings of the 2014 ACM SIGSAC …, 2014 - dl.acm.org
The ever-increasing sophistication in network attacks, combined with larger and larger
volumes of traffic, presents a dual challenge to network intrusion detection systems (IDSs) …

A lock-free, cache-efficient multi-core synchronization mechanism for line-rate network traffic monitoring

PPC Lee, T Bu… - 2010 IEEE International …, 2010 - ieeexplore.ieee.org
Line-rate data traffic monitoring in high-speed networks is essential for network
management. To satisfy the line-rate requirement, one can leverage multi-core architectures …

Method and apparatus for using a shared ring buffer to provide thread synchronization in a multi-core processor system

T Bu, G Chandranmenon, PC Lee - US Patent 8,751,737, 2014 - Google Patents
An apparatus and method for improving synchronization between threads in a multi-core
processor system are provided. An apparatus includes a memory, a first processor core, and …

Network-wide deployment of intrusion detection and prevention systems

V Sekar, R Krishnaswamy, A Gupta… - Proceedings of the 6th …, 2010 - dl.acm.org
Traditional efforts for scaling network intrusion detection (NIDS) and intrusion prevention
systems (NIPS) have largely focused on a single-vantage-point view. In this paper, we …