Exploiting stateful inspection of network security in reconfigurable hardware

被引:0
|
作者
Li, SM [1 ]
Torresen, J [1 ]
Soråsen, O [1 ]
机构
[1] Univ Oslo, Dept Informat, N-0316 Oslo, Norway
来源
FIELD-PROGRAMMABLE LOGIC AND APPLICATIONS, PROCEEDINGS | 2003年 / 2778卷
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
One of the most important areas of a network intrusion detection system (NIDS), stateful inspection, is described in this paper. We present a novel reconfigurable hardware architecture implementing TCP stateful inspection used in NIDS. This is to achieve a more efficient and faster network intrusion detection system as todays' NIDSs show inefficiency and even fail to perform while encountering the faster Internet. The performance of the NIDS described is expected to obtain a throughput of 3.0 Gbps.
引用
收藏
页码:1153 / 1157
页数:5
相关论文
共 50 条
  • [1] Exploiting reconfigurable hardware for network security
    Li, SM
    Torresen, J
    Soraasen, O
    FCCM 2003: 11TH ANNUAL IEEE SYMPOSIUM ON FIELD-PROGRAMMABLE CUSTOM COMPUTING MACHINES, PROCEEDINGS, 2003, : 292 - 293
  • [2] Stateful packet inspection for high-performance network security
    Yoon, S
    Oh, J
    Jang, J
    Proceedings of the Fourth IASTED International Conference on Communications, Internet, and Information Technology, 2005, : 355 - 359
  • [3] High-Performance Stateful Intrusion Detection in Reconfigurable Hardware
    Yoon, Seungyong
    Kim, Byoungkoo
    Oh, Jintae
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2007, 2 (01): : 68 - 74
  • [4] Reconfigurable hardware acceleration of WLAN security
    Smyth, N
    McLoone, M
    McCanny, JV
    2004 IEEE WORKSHOP ON SIGNAL PROCESSING SYSTEMS DESIGN AND IMPLEMENTATION, PROCEEDINGS, 2004, : 194 - 199
  • [5] Reconfigurable Analog Array for Hardware Security
    Chen, Ziyi
    Savidis, Ioannis
    2022 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS 22), 2022, : 1047 - 1051
  • [6] A GTP Stateful Inspection Method Based on Network Processor
    Zhang, Xiaoli
    Lai, Yue
    Xie, Shengli
    2008 11TH IEEE SINGAPORE INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS (ICCS), VOLS 1-3, 2008, : 994 - 998
  • [7] Directed Security Policies: A Stateful Network Implementation
    Diekmann, Cornelius
    Hupel, Lars
    Carle, Georg
    ELECTRONIC PROCEEDINGS IN THEORETICAL COMPUTER SCIENCE, 2014, (150): : 20 - 34
  • [8] Exploiting Lithography Limits for Hardware Security Applications
    Khan, Raihan Sayeed
    Noor, Nafisa
    Jin, Chenglu
    Muneer, Sadid
    Dirisaglik, Faruk
    Cywar, Adam
    Phuong Ha Nguyen
    van Dijk, Marten
    Gokirmak, Ali
    Silva, Helena
    2019 IEEE 19TH INTERNATIONAL CONFERENCE ON NANOTECHNOLOGY (IEEE-NANO 2019), 2019, : 9 - 12
  • [9] Hardware Security Strategies Exploiting Nanoelectronic Circuits
    Rose, Garrett S.
    Rajendran, Jeyavijayan
    McDonald, Nathan
    Karri, Ramesh
    Potkonjak, Miodrag
    Wysocki, Bryant
    2013 18TH ASIA AND SOUTH PACIFIC DESIGN AUTOMATION CONFERENCE (ASP-DAC), 2013, : 368 - 372
  • [10] BURAQ: A Dynamically Reconfigurable System for Stateful Measurement of Network Traffic
    Khan, Faisal
    Hosein, Nicholas
    Vernon, Scott
    Ghiasi, Soheil
    2010 18TH IEEE ANNUAL INTERNATIONAL SYMPOSIUM ON FIELD-PROGRAMMABLE CUSTOM COMPUTING MACHINES (FCCM 2010), 2010, : 185 - 192