Signature-based Intrusion Detection Hardware-Software Complex

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Signature-Based Approach for Intrusion Detection

This research presents a data mining technique for discovering masquerader intrusion. User/system access data are used as a basis for deriving statistically significant event patterns. These patterns could be considered as a user/system access signature. Signature-based approach employs a model discovery technique to derive a reference ground model accounting for the user/system access data. A ...

متن کامل

Exclusion-based Signature Matching for Intrusion Detection

We consider the problem of efficient string-based signature matching for Network Intrusion Detection Systems (NIDSes). String matching computations dominate in the overall cost of running a NIDS, despite the use of efficient generalpurpose string matching algorithms. Aiming at increasing the efficiency and capacity of NIDSes, we have designed ExB, a string matching algorithm tailored to the spe...

متن کامل

Intrusion Detection and Secured Data Transmission using Software Hardware Codesign

Dependability of the nodes in a group network is very important for its successful applications in the engineering area. Conventionally, when a node has a failure, it (i.e. data from that node) is usually discarded and the network is reorganized with faultless nodes to continue with the normal operation without a tradeoff with the functional coverage of the networks. In this paper, it is planne...

متن کامل

Hardware-Software Hybrid Packet Processing for Intrusion Detection Systems

Security is a major issue in today’s communication networks. Designing network intrusion detection systems (NIDS) calls for high performance circuits in order to keep up with the rising data rates. Offloading software processing to hardware realizations is not an economically viable solution and hence hardware-software based hybrid solutions for the NIDS scenario are discussed in literature. By...

متن کامل

A Review of Intrusion Detection Defense Solutions Based on Software Defined Network

Most networks without fixed infrastructure are based on cloud computing face various challenges. In recent years, different methods have been used to distribute software defined network to address these challenges. This technology, while having many capabilities, faces some vulnerabilities in the face of some common threats and destructive factors such as distributed Denial of Service. A review...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Information & Security: An International Journal

سال: 2020

ISSN: 0861-5160,1314-2119

DOI: 10.11610/isij.4715