Network Intrusion Detection Using Hardware Techniques: A Review

被引:0
|
作者
Abdulhammed, Razan [1 ]
Faezipour, Miad [1 ]
Elleithy, Khaled M. [1 ]
机构
[1] Univ Bridgeport, Dept Comp Sci & Engn, Bridgeport, CT 06604 USA
关键词
Intrusion detection system; FPGA; GPU; NFA; DFA; Pattern matching; TCAM; ASIC; Many-Core Processors; PACKET CLASSIFICATION;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The increasing amount of network throughput and security threat makes intrusion detection a major research problem. In the literature, intrusion detection has been approached by either a hardware or software technique. This paper reviews and compares hardware based techniques that are commonly used in intrusion detection systems with a special emphasis on modern hardware platforms such as FPGA, GPU, many-core processors and ASIC. It also provides a detailed comparison between these hardware solution platforms. Our approach to classify modern hardware-based Intrusion Detection System (IDS) techniques is based on the detection approach. In addition, we provide a comparison between the classified detection approaches based on essential criteria such as definition, update process, detection ability, features of the system, and implementation requirements. Finally, a classification tree of hardware-based NIDS platforms is given.
引用
收藏
页数:7
相关论文
共 50 条
  • [41] UNITE: Uniform hardware-based network intrusion deTection engine
    Yusuf, S.
    Luk, W.
    Szeto, M. K. N.
    Osborne, W.
    RECONFIGURABLE COMPUTING: ARCHITECTURES AND APPLICATIONS, 2006, 3985 : 389 - 400
  • [42] The NIDS cluster: Scalable, stateful network intrusion detection on commodity hardware
    Vallentin, Matthias
    Sommer, Robin
    Lee, Jason
    Leres, Craig
    Paxson, Vern
    Tierney, Brian
    RECENT ADVANCES IN INTRUSION DETECTION, PROCEEDINGS, 2007, 4637 : 107 - +
  • [43] Hardware Implementation for Network Intrusion Detection Rules with Regular Expression Support
    Lo, Chia-Tien Dan
    Tai, Yi-Gang
    Psarris, Kleanthis
    APPLIED COMPUTING 2008, VOLS 1-3, 2008, : 1535 - 1539
  • [44] Variable Length Pattern Matching for Hardware Network Intrusion Detection System
    Xue, Chun Jason
    Liu, Meilin
    Zhuge, QingFeng
    Sha, Edwin Hsing-Mean
    JOURNAL OF SIGNAL PROCESSING SYSTEMS FOR SIGNAL IMAGE AND VIDEO TECHNOLOGY, 2010, 59 (01): : 85 - 93
  • [45] Evaluation of the Huffman encoding for memory optimization on hardware network intrusion detection
    Freire, Eder
    Schnitman, Leizer
    Oliveira, Wagner
    Duarte, Angelo
    2013 III BRAZILIAN SYMPOSIUM ON COMPUTING SYSTEMS ENGINEERING (SBESC 2013), 2013, : 131 - 136
  • [46] High performance software-hardware network intrusion detection system
    Proudfoot, Ryan
    Kent, Kenneth
    Aubanel, Eric
    Chen, Nan
    ICFPT 2007: INTERNATIONAL CONFERENCE ON FIELD-PROGRAMMABLE TECHNOLOGY, PROCEEDINGS, 2007, : 309 - 312
  • [47] Variable Length Pattern Matching for Hardware Network Intrusion Detection System
    Chun Jason Xue
    Meilin Liu
    QingFeng Zhuge
    Edwin Hsing-Mean Sha
    Journal of Signal Processing Systems, 2010, 59 : 85 - 93
  • [48] Network based intrusion detection: A review of technologies
    Richards, K
    COMPUTERS & SECURITY, 1999, 18 (08) : 671 - 682
  • [49] Data Fusion for Network Intrusion Detection: A Review
    Li, Guoquan
    Yan, Zheng
    Fu, Yulong
    Chen, Hanlu
    SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [50] Multiagent Systems for Network Intrusion Detection: A Review
    Herrero, Alvaro
    Corchado, Emilio
    COMPUTATIONAL INTELLIGENCE IN SECURITY FOR INFORMATION SYSTEMS, 2009, 63 : 143 - 154