High Performance Intrusion Detection and Prevention Systems: A Survey

被引:0
作者
Potluri, Sasanka [1 ,2 ]
Diedrich, Christian [3 ]
机构
[1] Otto von Guericke Univ, Fac Comp Sci, Magdeburg, Germany
[2] Otto von Guericke Univ, Elect Engn & Informat Technol, Magdeburg, Germany
[3] Otto von Guericke Univ, Magdeburg, Germany
来源
PROCEEDINGS OF THE 15TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS 2016) | 2016年
关键词
intrusion detection system; intrusion prevention systems; high performance computing; network security; ARCHITECTURE;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
There is an enormous growth of industrial applications using internet communication. Secure network is a prime objective for the survival of any organization. Network monitoring and defence systems have become an integral part of network security for identifying and preventing potential attacks. Intrusion Detection and Prevention Systems (IDPS) are network based defence systems which combines Intrusion Detection System (IDS) and a firewall. In contrast to IDS, IDPS is a proactive technique which provides both quick reactions to potential threats and attacks in a network as well as preventing the attacks from entering the network. Current generation IDPS have their limitations on their performance and effectiveness. Some studies have proven that the modern IDPS have difficulties in dealing with high-speed network traffic. Meeting the current network requirements there exist several research approaches to find an efficient IDPS. Nevertheless, serious security and privacy breaches still occur every day, creating an absolute necessity to provide secure and safe information security systems. This survey provides an up-to-date comprehensive review on state of the art of IDPS based on different accelerating techniques, different detection algorithms, types of hardware and optimizing algorithms to match the demand requirements of high speed network. A detailed overview on high performance IDS and IDPS along with pros and cons of individual techniques will be given. This paper also highlights and discusses the requirement for developing a new IDPS to detect the known and unknown threats.
引用
收藏
页码:260 / 268
页数:9
相关论文
共 35 条
[1]  
[Anonymous], 2008, SECURITY ENG
[2]  
[Anonymous], 2005, P 3 WORKSH NETW PROC
[3]  
[Anonymous], TECH REP
[4]  
[Anonymous], TURN TRANSF CYB
[5]  
[Anonymous], 2016, CISC VIS NETW IND GL
[6]  
Artan NS, 2007, GLOB TELECOMM CONF, P343
[7]  
Brown D.J., 2002, A Survey of Intrusion Detection Systems
[8]  
Bu L, 2004, ANN IEEE SYM FIELD P, P316
[9]   An FPGA-based network intrusion detection architecture [J].
Das, Abhishek ;
Nguven, David ;
Zambreno, Joseph ;
Memik, Gokhan ;
Choudhary, Alok .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2008, 3 (01) :118-132
[10]   Intrusion Detection Systems for Wireless Sensor Networks: A Survey [J].
Farooqi, Ashfaq Hussain ;
Khan, Farrukh Aslam .
COMMUNICATION AND NETWORKING, 2009, 56 :234-241