Deployment of Intrusion Prevention System on Multi-Core Processor Based Security Hardware
نویسندگان
چکیده
منابع مشابه
Fpga-Based Multi-Core Processor
The paper presents the results of investigations concerning the possibility of using programmable logic devices (FPGA) to build virtual multi-core processors dedicated specifically towards particular applications. The paper shows the designed architecture of a multi-core processor specialized to perform a particular task, and it discusses its computational efficiency depending on the number of ...
متن کاملA Lightweight Intrusion Detection System Based on Specifications to Improve Security in Wireless Sensor Networks
Due to the prevalence of Wireless Sensor Networks (WSNs) in the many mission-critical applications such as military areas, security has been considered as one of the essential parameters in Quality of Service (QoS), and Intrusion Detection System (IDS) is considered as a fundamental requirement for security in these networks. This paper presents a lightweight Intrusion Detection System to prote...
متن کاملDSP Processor Core-Based Wireless System Design
This thesis considers the design of wireless communications systems which are implemented as highly integrated embedded systems comprised of a mixture of hardware components and software. An introductionary part presents digital communications systems, classification of processors, programmable digital signal processing (DSP) processors, and development and implementation of a flexible DSP proc...
متن کاملHardware Realization of Artificial Neural Network Based Intrusion Detection & Prevention System
In the 21st century with the exponential growth of the Internet, the vulnerability of the network which connects us is on the rise at a very fast pace. Today organizations are spending millions of dollars to protect their sensitive data from different vulnerabilities that they face every day. In this paper, a new methodology towards implementing an Intrusion Detection & Prevention System (IDPS)...
متن کاملNetwork Intrusion Detection Using a Hardware-Based Restricted Coulomb Energy Algorithm on a Cognitive Processor
The current state of the art in intrusion detection systems mainly relies on heuristic rules called signatures to detect intrusions to a network environment. The downside of signature based approaches is that they can only detect previously known attacks. Since no signature exists for new attacks, other approaches need to be considered. Here, machine learning algorithms may be beneficial. Addit...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International journal of Computer Networks & Communications
سال: 2018
ISSN: 0975-2293,0974-9322
DOI: 10.5121/ijcnc.2018.10302