Accelerated deep neural networks for enhanced intrusion detection system
Network based communication is more vulnerable to outsider and insider attacks in recent
days due to its wide spread applications in many fields. Intrusion Detection System (IDS) a …
days due to its wide spread applications in many fields. Intrusion Detection System (IDS) a …
[BOOK][B] The state of the art in intrusion prevention and detection
ASK Pathan - 2014 - api.taylorfrancis.com
Most of the security threats in various communications networks are posed by the illegitimate
entities that enter or intrude within the network perimeter, which could commonly be termed …
entities that enter or intrude within the network perimeter, which could commonly be termed …
MIDeA: a multi-parallel intrusion detection architecture
Network intrusion detection systems are faced with the challenge of identifying diverse
attacks, in extremely high speed networks. For this reason, they must operate at multi …
attacks, in extremely high speed networks. For this reason, they must operate at multi …
IoT-based fall detection for smart home environments
S Greene, H Thapliyal… - 2016 IEEE international …, 2016 - ieeexplore.ieee.org
The rise of internet connected devices has enabledthe home with a vast amount of
enhancements to make lifemore convenient. These internet connected devices can be used …
enhancements to make lifemore convenient. These internet connected devices can be used …
[HTML][HTML] A dynamic and scalable parallel Network Intrusion Detection System using intelligent rule ordering and Network Function Virtualization
Abstract A Network Intrusion Detection System (NIDS) is a fundamental security tool.
However, under heavy network traffic, a NIDS might become a bottleneck. In an overloaded …
However, under heavy network traffic, a NIDS might become a bottleneck. In an overloaded …
Flow-based approach to detect abnormal behavior in neighbor discovery protocol (NDP)
Internet Protocol version six (IPv6) is equipped with new protocols, such as the Neighbor
Discovery Protocol (NDP). NDP is a stateless protocol without authentication that makes it …
Discovery Protocol (NDP). NDP is a stateless protocol without authentication that makes it …
Beyond pattern matching: A concurrency model for stateful deep packet inspection
The ever-increasing sophistication in network attacks, combined with larger and larger
volumes of traffic, presents a dual challenge to network intrusion detection systems (IDSs) …
volumes of traffic, presents a dual challenge to network intrusion detection systems (IDSs) …
A lock-free, cache-efficient multi-core synchronization mechanism for line-rate network traffic monitoring
PPC Lee, T Bu… - 2010 IEEE International …, 2010 - ieeexplore.ieee.org
Line-rate data traffic monitoring in high-speed networks is essential for network
management. To satisfy the line-rate requirement, one can leverage multi-core architectures …
management. To satisfy the line-rate requirement, one can leverage multi-core architectures …
Method and apparatus for using a shared ring buffer to provide thread synchronization in a multi-core processor system
T Bu, G Chandranmenon, PC Lee - US Patent 8,751,737, 2014 - Google Patents
An apparatus and method for improving synchronization between threads in a multi-core
processor system are provided. An apparatus includes a memory, a first processor core, and …
processor system are provided. An apparatus includes a memory, a first processor core, and …
Network-wide deployment of intrusion detection and prevention systems
Traditional efforts for scaling network intrusion detection (NIDS) and intrusion prevention
systems (NIPS) have largely focused on a single-vantage-point view. In this paper, we …
systems (NIPS) have largely focused on a single-vantage-point view. In this paper, we …