Network Intrusion Detection Using Hardware Techniques: A Review

被引:0
|
作者
Abdulhammed, Razan [1 ]
Faezipour, Miad [1 ]
Elleithy, Khaled M. [1 ]
机构
[1] Univ Bridgeport, Dept Comp Sci & Engn, Bridgeport, CT 06604 USA
关键词
Intrusion detection system; FPGA; GPU; NFA; DFA; Pattern matching; TCAM; ASIC; Many-Core Processors; PACKET CLASSIFICATION;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The increasing amount of network throughput and security threat makes intrusion detection a major research problem. In the literature, intrusion detection has been approached by either a hardware or software technique. This paper reviews and compares hardware based techniques that are commonly used in intrusion detection systems with a special emphasis on modern hardware platforms such as FPGA, GPU, many-core processors and ASIC. It also provides a detailed comparison between these hardware solution platforms. Our approach to classify modern hardware-based Intrusion Detection System (IDS) techniques is based on the detection approach. In addition, we provide a comparison between the classified detection approaches based on essential criteria such as definition, update process, detection ability, features of the system, and implementation requirements. Finally, a classification tree of hardware-based NIDS platforms is given.
引用
收藏
页数:7
相关论文
共 50 条
  • [1] Review on Network Intrusion Detection Techniques using Machine Learning
    Shashank, K.
    Balachandra, Mamatha
    PROCEEDINGS OF 2018 IEEE DISTRIBUTED COMPUTING, VLSI, ELECTRICAL CIRCUITS AND ROBOTICS (DISCOVER), 2018, : 104 - 109
  • [2] Intrusion detection techniques in network environment: a systematic review
    Maruthi Rohit Ayyagari
    Nishtha Kesswani
    Munish Kumar
    Krishan Kumar
    Wireless Networks, 2021, 27 : 1269 - 1285
  • [3] Intrusion detection techniques in network environment: a systematic review
    Ayyagari, Maruthi Rohit
    Kesswani, Nishtha
    Kumar, Munish
    Kumar, Krishan
    WIRELESS NETWORKS, 2021, 27 (02) : 1269 - 1285
  • [4] Network Intrusion Detection Using Machine Learning Techniques
    Almutairi, Yasmeen
    Alhazmi, Bader
    Munshi, Amr
    ADVANCES IN SCIENCE AND TECHNOLOGY-RESEARCH JOURNAL, 2022, 16 (03) : 193 - 206
  • [5] Network Intrusion Detection, Literature Review and Some Techniques Comparision
    Nassar, Mostafa
    El-Bahnasawy, Nirmeen A.
    Ahmed, HossamEl-din H.
    Saleeb, Adel A.
    Abd El-Samie, Fathi E.
    2019 15TH INTERNATIONAL COMPUTER ENGINEERING CONFERENCE (ICENCO 2019), 2019, : 62 - 71
  • [6] A REVIEW AND COMPARISON OF VISUALIZATION TECHNIQUES FOR NETWORK INTRUSION DETECTION SYSTEM
    Zaki, Fakhrul Adli Mohd
    Saman, Md Yazid Mohd
    Megat, Megat Fakruddin
    PROCEEDINGS OF THE FOURTH INTERNATIONAL CONFERENCE ON INTERNET TECHNOLOGIES AND APPLICATIONS (ITA 11), 2011, : 407 - 414
  • [7] Acceleration of Intrusion Detection in Encrypted Network Traffic Using Heterogeneous Hardware
    Papadogiannaki, Eva
    Ioannidis, Sotiris
    SENSORS, 2021, 21 (04) : 1 - 21
  • [8] Assisting network intrusion detection with reconfigurable hardware
    Hutchings, BL
    Franklin, R
    Carver, D
    10TH ANNUAL IEEE SYMPOSIUM ON FIELD-PROGRAMMABLE CUSTOM COMPUTING MACHINES, PROCEEDINGS, 2002, : 111 - 120
  • [9] A Review on Intrusion Detection Techniques and Intrusion Detection systems in MANETS
    Chakravarthi, S. Sreenivasa
    Veluru, Suresh
    2014 6TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMMUNICATION NETWORKS, 2014, : 730 - 737
  • [10] Network intrusion detection using data dimensions reduction techniques
    Shiravani, Anita
    Sadreddini, Mohammad Hadi
    Nahook, Hassan Nosrati
    JOURNAL OF BIG DATA, 2023, 10 (01)