A Real-Time Hardware Intrusion Detection System and a Classifying Features Algorithm

被引:0
作者
Sobh, Tarek Salah [1 ]
机构
[1] El Shorouk Acad, Higher Inst Comp & Informat Technol, Cairo, Egypt
关键词
Network security; feature extraction; hash table; decision tree; FPGA;
D O I
10.1080/19361610.2022.2103363
中图分类号
DF [法律]; D9 [法律];
学科分类号
0301 ;
摘要
Nowadays, everybody needs to secure his/her activities. Existing levels of cyber-criminals need technology for detecting malicious activity. This work proposes a real-time Hardware IDS implemented on FPGA and an algorithm for classifying features from network traffic through the network interface card (NIC). It minimizes search time for extracting statistical features from connection records stored in connection queues to memory references. Therefore, it can detect most internal and external network attacks. A decision tree classifier is used as an inference engine and gives a high detection rate of 99.93%.
引用
收藏
页码:845 / 879
页数:35
相关论文
共 42 条
[1]   Using Hash Table to Extract Real-Time Online Network Traffic Features for Hardware IDS [J].
Amer, Mohamed Ibrahiem ;
Sobh, Tarek S. ;
Mohamed, Gouda Ismail .
INFORMATION SECURITY JOURNAL, 2012, 21 (01) :55-63
[2]  
[Anonymous], 2000, P DARPA INFORM SURVI
[3]  
[Anonymous], 2005, 80232005 IEEE
[4]  
[Anonymous], 2008, HDB DATA MINING
[5]  
Bojani S., 2010, INFORM ASSURANCE SEC, V1, P12
[6]   An efficient network intrusion detection [J].
Chen, Chia-Mei ;
Chen, Ya-Lin ;
Lin, Hsiao-Chung .
COMPUTER COMMUNICATIONS, 2010, 33 (04) :477-484
[7]   Malware detection in mobile environments based on Autoencoders and API-images [J].
D'Angelo, Gianni ;
Ficco, Massimo ;
Palmieri, Francesco .
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2020, 137 :26-33
[8]   Knowledge elicitation based on genetic programming for non destructive testing of critical aerospace systems [J].
D'Angelo, Gianni ;
Palmieri, Francesco .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 102 :633-642
[9]   An uncertainty-managing batch relevance-based approach to network anomaly detection [J].
D'angelo, Gianni ;
Palmieri, Francesco ;
Ficco, Massimo ;
Rampone, Salvatore .
APPLIED SOFT COMPUTING, 2015, 36 :408-418
[10]  
Dada E.G., 2017, Arid Zone Journal of Engineering, Technology and Environment, V13, P764