Network Intrusion Detection Using Hardware Techniques: A Review

被引:0
|
作者
Abdulhammed, Razan [1 ]
Faezipour, Miad [1 ]
Elleithy, Khaled M. [1 ]
机构
[1] Univ Bridgeport, Dept Comp Sci & Engn, Bridgeport, CT 06604 USA
关键词
Intrusion detection system; FPGA; GPU; NFA; DFA; Pattern matching; TCAM; ASIC; Many-Core Processors; PACKET CLASSIFICATION;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The increasing amount of network throughput and security threat makes intrusion detection a major research problem. In the literature, intrusion detection has been approached by either a hardware or software technique. This paper reviews and compares hardware based techniques that are commonly used in intrusion detection systems with a special emphasis on modern hardware platforms such as FPGA, GPU, many-core processors and ASIC. It also provides a detailed comparison between these hardware solution platforms. Our approach to classify modern hardware-based Intrusion Detection System (IDS) techniques is based on the detection approach. In addition, we provide a comparison between the classified detection approaches based on essential criteria such as definition, update process, detection ability, features of the system, and implementation requirements. Finally, a classification tree of hardware-based NIDS platforms is given.
引用
收藏
页数:7
相关论文
共 50 条
  • [21] Review of AI Techniques in development of Network Intrusion Detection System in SDN Framework
    Dahiya, Seema
    Siwach, Vikas
    Sehrawat, Harkesh
    2021 INTERNATIONAL CONFERENCE ON COMPUTATIONAL PERFORMANCE EVALUATION (COMPE-2021), 2021, : 168 - +
  • [22] Review on Hardware Trojan Detection Techniques
    R. Naveenkumar
    N. M. Sivamangai
    A. Napolean
    S. Sridevi Sathayapriya
    National Academy Science Letters, 2023, 46 : 521 - 524
  • [23] Information fusion techniques for network intrusion detection
    Ye, N
    Giordano, J
    Feldman, J
    Zhong, Q
    1998 IEEE INFORMATION TECHNOLOGY CONFERENCE, PROCEEDINGS, 1998, : 117 - 120
  • [24] Evaluating clustering techniques for network intrusion detection
    Zhong, S
    Khoshgoftaar, T
    Seliya, N
    TENTH ISSAT INTERNATIONAL CONFERENCE ON RELIABILITY AND QUALITY IN DESIGN, PROCEEDINGS, 2004, : 173 - 177
  • [25] Gigabit Network Intrusion Detection System Using Extended Bloom Filter in Reconfigurable Hardware
    Jose, Akshay Eldho
    Gireeshkumar, T.
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION TECHNOLOGIES, IC3T 2015, VOL 1, 2016, 379 : 11 - 19
  • [26] Review on intrusion detection using feature selection with machine learning techniques
    Kalimuthan, C.
    Renjit, J. Arokia
    MATERIALS TODAY-PROCEEDINGS, 2020, 33 : 3794 - 3802
  • [27] Efficient hardware support for pattern matching in network intrusion detection
    Guinde, Nitesh B.
    Ziavras, Sotirios G.
    COMPUTERS & SECURITY, 2010, 29 (07) : 756 - 769
  • [28] A New Curriculum for Hardware-Based Network Intrusion Detection
    Lo, Dan
    Wang, Andy
    North, Sarah
    North, Max
    PROCEEDINGS OF THE 49TH ANNUAL ASSOCIATION FOR COMPUTING MACHINERY SOUTHEAST CONFERENCE (ACMSE '11), 2011, : 318 - 319
  • [29] An efficient hardware-based design for network intrusion detection
    Department of Electronics Engineering, Ching Yun University, Chungli 320, Taiwan
    WSEAS Trans. Electron., 2007, 3 (49-55):
  • [30] Flexible software-hardware Network Intrusion Detection System
    Proudfoot, Ryan
    Kent, Kenneth
    Aubanel, Eric
    Chen, Nan
    RSP 2008: 19TH IEEE/IFIP INTERNATIONAL SYMPOSIUM ON RAPID SYSTEM PROTOTYPING, PROCEEDINGS, 2008, : 182 - 188