Neuromorphic Computing Applications for Network Intrusion Detection Systems

被引:0
作者
Garcia, Raymond C. [1 ]
Pino, Robinson E. [1 ]
机构
[1] ICF Int, Fairfax, VA 22031 USA
来源
MACHINE INTELLIGENCE AND BIO-INSPIRED COMPUTATION: THEORY AND APPLICATIONS VIII | 2014年 / 9119卷
关键词
Intrusion Detection; Neuromorphic; Security; Fractal; Autonomous Neural Structuring; Cloud Computing;
D O I
10.1117/12.2052394
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
What is presented here is a sequence of evolving concepts for network intrusion detection. These concepts start with neuromorphic structures for XOR-based signature matching and conclude with computationally based network intrusion detection system with an autonomous structuring algorithm. There is evidence that neuromorphic computation for network intrusion detection is fractal in nature under certain conditions. Specifically, the neural structure can take fractal form when simple neural structuring is autonomous. A neural structure is fractal by definition when its fractal dimension exceeds the synaptic matrix dimension. The authors introduce the use of fractal dimension of the neuromorphic structure as a factor in the autonomous restructuring feedback loop.
引用
收藏
页数:8
相关论文
共 19 条
[1]  
Amoli Payam Vahdani, 2013, 2013 IEEE International Workshop on Measurements & Networking (M&N), P149, DOI 10.1109/IWMN.2013.6663794
[2]   Network intrusion detection systems in high-speed traffic in computer networks [J].
Bul'ajoul, Waleed ;
James, Anne ;
Pannu, Mandeep .
2013 IEEE 10TH INTERNATIONAL CONFERENCE ON E-BUSINESS ENGINEERING (ICEBE), 2013, :168-175
[3]  
Catania Carlos, 2013, 2013 IEEE 7th International Conference on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS), P655, DOI 10.1109/IDAACS.2013.6663006
[4]  
Chen QW, 2013, ICCAD-IEEE ACM INT, P202, DOI 10.1109/ICCAD.2013.6691119
[5]  
Chih-Hung Lin, 2012, 2012 IEEE 4th International Conference on Cloud Computing Technology and Science (CloudCom). Proceedings, P249, DOI 10.1109/CloudCom.2012.6427583
[6]   Hardware acceleration of regular expression repetitions in deep packet inspection [J].
Cronin, Brendan ;
Wang, Xiaojun .
IET INFORMATION SECURITY, 2013, 7 (04) :327-335
[7]  
Hasan R, 2013, 2013 2ND INTERNATIONAL CONFERENCE ON ADVANCES IN ELECTRICAL ENGINEERING (ICAEE 2013), P329, DOI 10.1109/ICAEE.2013.6750358
[8]  
HIEU TT, 2013, UB FUT NETW ICUFN 20, P252
[9]   Signature Based Intrusion Detection for Zero-Day Attacks: (Not) A Closed Chapter? [J].
Holm, Hannes .
2014 47TH HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS), 2014, :4895-4904
[10]  
Huan-ming Wen, 2011, 2011 International Conference on Multimedia Technology, P757