A Survey of Parallel Intrusion Detection on Graphical Processors

被引:0
|
作者
Vokorokos, Liberios [1 ]
Ennert, Michal [1 ]
Hartinger, Miroslav [1 ]
Radusovsky, Jan [1 ]
机构
[1] Tech Univ Kosice, Dept Comp & Informat, Kosice, Slovakia
来源
INFORMATICS 2013: PROCEEDINGS OF THE TWELFTH INTERNATIONAL CONFERENCE ON INFORMATICS | 2013年
关键词
Intrusion detection; GPGPU; parallel computing; high performance computing; survey;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Intrusion detection is enormously developing field of informatics. This paper provides a survey of actual trends in intrusion detection in academic research. It presents a review about the evolution of intrusion detection systems with usage of general purpose computing on graphics processing units (GPGPU). There are many detection techniques but only some of them bring advantages of parallel computing implementation to graphical processors (GPU). The most common technique transformed into GPU is the technique of pattern matching. There is a number of intrusion detection tools using CPU tested in real network traffic.
引用
收藏
页码:50 / 55
页数:6
相关论文
共 50 条
  • [1] A Survey of parallel intrusion detection on graphical processors
    Vokorokos, Liberios
    Ennert, Michal
    Cajkovsky, Marek
    Radusovsky, Jan
    OPEN COMPUTER SCIENCE, 2014, 4 (04): : 222 - 230
  • [2] Graphical inference for multiple intrusion detection
    Le, Tung
    Hadjicostis, Christoforos N.
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2008, 3 (03) : 370 - 380
  • [3] Swarm intelligence in intrusion detection: A survey
    Kolias, C.
    Kambourakis, G.
    Maragoudakis, M.
    COMPUTERS & SECURITY, 2011, 30 (08) : 625 - 642
  • [4] Intrusion Detection in SCADA System: A Survey
    Zeng, Pu
    Zhou, Peng
    INTELLIGENT COMPUTING AND INTERNET OF THINGS, PT II, 2018, 924 : 342 - 351
  • [5] A graphical feature generation approach for intrusion detection
    Chen, Shi
    Zuo, Zhen
    Huang, Zhi Ping
    Guo, Xiao Jun
    2016 INTERNATIONAL CONFERENCE ON ELECTRONIC, INFORMATION AND COMPUTER ENGINEERING, 2016, 44
  • [6] IN-BUILT INTRUSION DETECTION SYSTEM FOR EMBEDDED PROCESSORS
    Rahimunnisa, K.
    Varkey, Rincy Merrin
    Sureshkumar, S.
    2011 INTERNATIONAL CONFERENCE ON COMPUTER, ELECTRICAL, AND SYSTEMS SCIENCES, AND ENGINEERING (CESSE 2011), 2011, : 524 - +
  • [7] A Survey on Intrusion Detection Tools
    Bhati, Bhoopesh Singh
    Rai, C. S.
    PROCEEDINGS OF THE 2019 6TH INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2019, : 806 - 810
  • [8] Optimizing ion channel models using a parallel genetic algorithm on graphical processors
    Ben-Shalom, Roy
    Aviv, Amit
    Razon, Benjamin
    Korngreen, Alon
    JOURNAL OF NEUROSCIENCE METHODS, 2012, 206 (02) : 183 - 194
  • [9] Provenance-based Intrusion Detection Systems: A Survey
    Zipperle, Michael
    Gottwalt, Florian
    Chang, Elizabeth
    Dillon, Tharam
    ACM COMPUTING SURVEYS, 2023, 55 (07)
  • [10] Research of Intrusion Detection Algorithm Based on Parallel SVM on Spark
    Wang, Hongbing
    Xiao, Youan
    Long, Yihong
    PROCEEDINGS OF 2017 IEEE 7TH INTERNATIONAL CONFERENCE ON ELECTRONICS INFORMATION AND EMERGENCY COMMUNICATION (ICEIEC), 2017, : 153 - 156