High Ppeed Circuit Techniques for Network Intrusion Detection Systems (NIDS)
|
|
- Paul Crawford
- 5 years ago
- Views:
Transcription
1 The University of Akron Mechanical Engineering Faculty Research Mechanical Engineering Department 2008 High Ppeed Circuit Techniques for Network Intrusion Detection Systems (NIDS) Ajay Mohan Mahajan University of Akron, main campus Please take a moment to share how this work helps you through this survey. Your feedback will be important as we plan further development of our repository. Follow this and additional works at: Part of the Electrical and Computer Engineering Commons, and the Mechanical Engineering Commons Recommended Citation Mahajan, Ajay Mohan, "High Ppeed Circuit Techniques for Network Intrusion Detection Systems (NIDS)" (2008). Mechanical Engineering Faculty Research This Dissertation is brought to you for free and open access by Mechanical Engineering Department at IdeaExchange@UAkron, the institutional repository of The University of Akron in Akron, Ohio, USA. It has been accepted for inclusion in Mechanical Engineering Faculty Research by an authorized administrator of IdeaExchange@UAkron. For more information, please contact mjon@uakron.edu, uapress@uakron.edu.
2 HIGH SPEED CIRCUIT TECHNIQUES FOR NETWORK INTRUSION DETECTION SYSTEMS (NIDS) by Atul Mahajan B.E., Electronics and Communication Engineering Visveswaraiah Technological University, India, 2004 A Thesis Submitted in Partial Fulfillment of the Requirements for the Master of Science Degree Department of Electrical and Computer Engineering in the Graduate School Southern Illinois University Carbondale December 2008
3
4 THESIS APPROVAL HIGH SPEED CIRCUIT TECHNIQUES FOR NETWORK INTRUSION DETECTION SYSTEMS (NIDS) By Atul Mahajan A Thesis Submitted in Partial Fulfillment of the Requirements for the Degree of Master of Science in the field of Electrical and Computer Engineering Approved by: Dr. Haibo Wang, Chair Dr. Ning Weng Dr. Spyros Tragoudas Graduate School Southern Illinois University Carbondale August 22, 2008
5 AN ABSTRACT OF THE THESIS OF ATUL MAHAJAN, for the Master of Science in ELECTRICAL AND COMPUTER ENGINEERING, presented on August 22 nd, 2008, at Southern Illinois University Carbondale. TITLE: HIGH SPEED CIRCUIT TECHNIQUES FOR NETWORK INTRUSION DETECTION SYSTEMS (NIDS) MAJOR PROFESSOR: Dr. Haibo Wang This thesis presents a string matching hardware implemented on FPGA platforms for network intrusion detection systems. The proposed architecture, consisting of packet classifiers and strings matching verifiers, achieves superb throughput by using several mechanisms. First, based on incoming packet contents, the packet classifier scan dramatically reduce the number of strings to be matched for each packet and, accordingly, feed the packet to a proper verifier to conduct matching. Second, a novel multi-threading finite state machine (FSM) is proposed, which improves FSM clock frequency and allows multiple packets to be examined by a single FSM simultaneously. Design techniques for high-speed interconnect and interface circuits are also presented. Experimental results are presented to explore the trade-offs between system performance, strings partition granularity and hardware resource cost. i
6 ACKNOWLEDGMENTS I would like to express my deepest appreciation to my thesis mentor, Dr. Haibo Wang, who has guided and motivated me to this wonderful research area and given me a chance to work on this project. My sincere thanks also go to my committee members Dr. Ning Weng and Dr. Spyros Tragoudas who helped making this research more informed with their valuable comments and remarks. I appreciate Southern Illinois University Carbondale and the Department of Electrical and Computer Engineering for providing necessary technical support for this work. ii
7 TABLE OF CONTENTS CHAPTER PAGE ABSTRACT...i ACKNOWLEDGMENTS... ii LIST OF TABLES...iv LIST OF FIGURES...v CHAPTERS CHAPTER 1 Introduction...1 CHAPTER 2 Related Work...5 CHAPTER 3 Proposed Network Intrusion Detection System...12 CHAPTER 4 High Throughput Verifier Design...19 CHAPTER 5 Implementation and Experimental Results...32 CHAPTER 6 Conclusions and Future Work...45 REFERENCES...47 VITA...50 iii
8 LIST OF TABLES TABLE PAGE Table 1 Attack methods and solutions...6 Table 2 FSM clock frequency for M-threading FSMs...34 Table 3 Percentage Resource Utilization (Virtex 4 FX100 device) for M-threading FSMs...37 iv
9 LIST OF FIGURES FIGURE PAGE Figure 1 Fields of an IP Packet...5 Figure 2 Virtex-5 FPGA Family...9 Figure 3 Block RAM Logic Diagram - one port shown...10 Figure 4 Proposed Network Intrusion Detection System Architecture...13 Figure 5 Bus Based Technology for Interconnect between Classifiers and FSMs...14 Figure 6 Proposed Classifier Architecture...16 Figure 7 A Conventional FSM...21 Figure 8 A Pipelined FSM...23 Figure 9 A Multi-threading FSM...24 Figure 10 Connecting Multiple FSMs...27 Figure 11 A Simple Interface Circuit...29 Figure 12 A High-speed Interface Circuit...31 Figure 13 Flowchart Depicting Implementation of Proposed Technique on FPGA...33 Figure 14 FSM Clock Frequency versus Number of Threads...35 Figure 15 DFF Utilization in Multi-threading FSMs...38 Figure 16 FPGA Resource Utilization for Different FSM Partitions...39 Figure 17 Interconnect Delay with Different FSM Sizes...40 Figure 18 Snapshot of Floorplan for 10 FSM Modules on Virtex4 FX100 Device...41 Figure 19 Delay of FSM Input Path...42 v
10 Figure 20 Snapshot of Floorplan of FSM of Size Figure 21 Snapshot showing Minimum Time Period for FSM of Size Figure 22 Snapshot showing Simulated Waveforms for FSM...44 vi
11 1 CHAPTER 1 INTRODUCTION Over the past few years, there has been a manifold increase in the Internet applications. This increase has undoubtedly raised the standard of life all over the world. Most of the things can now be done while sitting at home and using the network, more commonly known as Internet. While the Internet brings enormous convenience, it also creates the possibilities for hackers or enemies to steal secretary information or derail the normal operation of organizations. Because of these Internet attacks, the Internet security becomes an important issue in the increasingly connected world. There have been enormous cases in the recent history where the lack of network security has led to major fraudulent activities. The biggest and most famous case is the hacking of wireless networks of nine major retailers in USA. As a result, more than 41 million credit and debit card numbers were stolen. This case which happened in 2007 shocked the internet society all over the world. It clearly depicts that in spite of the highly sophisticated network security systems available nowadays, no one is guaranteed to be 100% safe in the Internet. Even the best available network security system can not provide 100% safety as everyday the intruders are developing newer ways of possible network attacks. This requires the security system to be updated periodically to keep up with all sorts of attacks. In the near future, there will be more and more data transmitted over the networks. Not only financial information but all the official information related to the nation s security
12 2 is also available over the networks. As an instance, any intrusion in the network of Department of Defense of any nation can lead to dreadful consequences for the entire world. Hence, network security is the area which can never be ignored and need to be constantly updated. One of the most promising techniques that provide the lacking security of the internet is Network Intrusion Detection System (NIDS) [8, 13, 18]. Although an NIDS normally contains various sub-systems, its most important component is a string matching engine. In order to detect any suspicious activity, the sting matching engine compares the incoming network packet with predefined patterns which are defined as a set of rules. According to the Snort version 2.4 there are a total of 3305 such rules. Each rule consists of two types of strings to be matched: one is header strings with determined position in packet header (e.g., source/destination network address and source/destination port number); another is payload strings with probabilistic position in packet payload (e.g., network worms and computer virus). A suspicious activity is detected when both header strings and at least one of payload strings are matched on the packet. This simple string matching engine was successful in detecting attacks when the network traffic was very low and also there were few possible attack rules. But in present day situation, where the network traffic is in the high range of ten Gigabit per second and also there are thousands of possible attack rules, this simple engine can become the bottleneck of the overall NIDS. Also, it is necessary to scan every byte of a packet as the starting position of payload string might be probabilistic. The NIDS can be developed either in software or hardware. The existing softwarebased NIDS are very slow and they are capable to operate successfully only if the
13 3 network traffic is very low, in the order of hundred Megabits per second. In order to overcome the drawbacks of the software-based NIDS, various hardware approaches [4, 2, 6, 9, 12] have been proposed. However, all of them are either lacking performance, scalability to traffic rate and attack rules, or they are too complicated to design and operate. To address these concerns, a simple but efficient architecture based on scalable classifiers and novel multi-threading finite state machines (FSMs) has been designed. The classifier arranges the incoming packet to three categories: malicious, suspected or benign. Malicious packets are directly discarded and the benign packets are forwarded to the network. Most of the incoming packets (85%) to the network are benign [3]. Only the suspected packets are sent to the string matching engine. FSMs in the matching engine are used to further verify whether the suspected packet is malicious one. The key to achieving high performance of this architecture is employing multiple small and fast FSMs. Each of these FSMs searches for a portion of rules on a suspected packet and accordingly marks it as benign or malicious. The focus of this thesis is to design and implement the high-speed verifier on Field Programmable Gate Array (FPGA) platforms. The high-speed verifier is based on the concept of using FSMs to search a set of patterns. In order to improve the throughput of the verifier, a novel multi-threading FSM design has been proposed. A new circuit to feed the multi-threading FSM has also been developed. Investigations are conducted to study the granularity of the FSMs and experimental results have demonstrated that this proposed architecture achieves superb throughput.
Packet Inspection on Programmable Hardware
Abstract Packet Inspection on Programmable Hardware Benfano Soewito Information Technology Department, Bakrie University, Jakarta, Indonesia E-mail: benfano.soewito@bakrie.ac.id In the network security
More informationSelf-Addressable Memory-Based FSM: A Scalable Intrusion Detection Engine
Southern Illinois University Carbondale pensiuc Articles Department of Electrical and Computer Engineering 1-2009 Self-Addressable Memory-Based FSM: A Scalable Intrusion Detection Engine Benfano Soewito
More informationA New Platform NIDS Based On WEMA
I.J. Information Technology and Computer Science, 2015, 06, 52-58 Published Online May 2015 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijitcs.2015.06.07 A New Platform NIDS Based On WEMA Adnan A.
More informationDesign and Implementation of DPI Mechanism for NIDS on FPGA
Design and Implementation of DPI Mechanism for NIDS on FPGA Veena M P 1, Divya Prabha 2, Dr. M Z Kurian 3 M.Tech [Digital electronics], Sri Siddhartha Institute of Technology, Tumkur, Karnataka, India
More informationand the Forensic Science CC Spring 2007 Prof. Nehru
and the Introduction The Internet, (Information superhighway), has opened a medium for people to communicate and to access millions of pieces of information from computers located anywhere on the globe.
More informationA senior design project on network security
Michigan Technological University Digital Commons @ Michigan Tech School of Business and Economics Publications School of Business and Economics Fall 2007 A senior design project on network security Yu
More informationHash-Based String Matching Algorithm For Network Intrusion Prevention systems (NIPS)
Hash-Based String Matching Algorithm For Network Intrusion Prevention systems (NIPS) VINOD. O & B. M. SAGAR ISE Department, R.V.College of Engineering, Bangalore-560059, INDIA Email Id :vinod.goutham@gmail.com,sagar.bm@gmail.com
More informationOverview of Honeypot Security System for E-Banking
Prajakta Shirbhate, Vaishnavi Dhamankar, Aarti Kshirsagar, Purva Deshpande & Smita Kapse Department of Computer Technology, YCCE, Nagpur, Maharashtra, India E-mail : prajakta.2888@gmail.com, vaishnavi.dhamankar@gmail.com,
More informationCSE 565 Computer Security Fall 2018
CSE 565 Computer Security Fall 2018 Lecture 19: Intrusion Detection Department of Computer Science and Engineering University at Buffalo 1 Lecture Outline Intruders Intrusion detection host-based network-based
More informationComputer Network Vulnerabilities
Computer Network Vulnerabilities Objectives Explain how routers are used to protect networks Describe firewall technology Describe intrusion detection systems Describe honeypots Routers Routers are like
More informationStatistical based Approach for Packet Classification
Statistical based Approach for Packet Classification Dr. Mrudul Dixit 1, Ankita Sanjay Moholkar 2, Sagarika Satish Limaye 2, Devashree Chandrashekhar Limaye 2 Cummins College of engineering for women,
More informationIJSER. Virtualization Intrusion Detection System in Cloud Environment Ku.Rupali D. Wankhade. Department of Computer Science and Technology
ISSN 2229-5518 321 Virtualization Intrusion Detection System in Cloud Environment Ku.Rupali D. Wankhade. Department of Computer Science and Technology Abstract - Nowadays all are working with cloud Environment(cloud
More informationEmploying Multi-FPGA Debug Techniques
Employing Multi-FPGA Debug Techniques White Paper Traditional FPGA Debugging Methods Debugging in FPGAs has been difficult since day one. Unlike simulation where designers can see any signal at any time,
More informationDetecting Network Reconnaissance with the Cisco Cyber Threat Defense Solution 1.0
Detecting Network Reconnaissance with the Cisco Cyber Threat Defense Solution 1.0 April 9, 2012 Introduction One of the earliest indicators of an impending network attack is the presence of network reconnaissance.
More informationA Framework for Rule Processing in Reconfigurable Network Systems
A Framework for Rule Processing in Reconfigurable Network Systems Michael Attig and John Lockwood Washington University in Saint Louis Applied Research Laboratory Department of Computer Science and Engineering
More informationA Review Paper on Network Security Attacks and Defences
EUROPEAN ACADEMIC RESEARCH Vol. IV, Issue 12/ March 2017 ISSN 2286-4822 www.euacademic.org Impact Factor: 3.4546 (UIF) DRJI Value: 5.9 (B+) A Review Paper on Network Security Attacks and ALLYSA ASHLEY
More informationComparison of Firewall, Intrusion Prevention and Antivirus Technologies
Comparison of Firewall, Intrusion Prevention and Antivirus Technologies (How each protects the network) Dr. Gaurav Kumar Jain Email: gaurav.rinkujain.jain@gmail.com Mr. Pradeep Sharma Mukul Verma Abstract
More informationScaling PortfolioCenter on a Network using 64-Bit Computing
Scaling PortfolioCenter on a Network using 64-Bit Computing Alternate Title: Scaling PortfolioCenter using 64-Bit Servers As your office grows, both in terms of the number of PortfolioCenter users and
More informationFPGA based Network Traffic Analysis using Traffic Dispersion Graphs
FPGA based Network Traffic Analysis using Traffic Dispersion Graphs 2 nd September, 2010 Faisal N. Khan, P. O. Box 808, Livermore, CA 94551 This work performed under the auspices of the U.S. Department
More informationMONITORING AND MANAGING NETWORK FLOWS IN VMWARE ENVIRONMENTS
WHITEPAPER MONITORING AND MANAGING NETWORK FLOWS IN VMWARE ENVIRONMENTS By Trevor Pott www.apcon.com onitoring and managing network flows is a critical part of a secure and efficient approach to IT. Unfortunately,
More informationA Proposal for a High Speed Multicast Switch Fabric Design
A Proposal for a High Speed Multicast Switch Fabric Design Cheng Li, R.Venkatesan and H.M.Heys Faculty of Engineering and Applied Science Memorial University of Newfoundland St. John s, NF, Canada AB X
More informationISSN Vol.05, Issue.12, December-2017, Pages:
ISSN 2322-0929 Vol.05, Issue.12, December-2017, Pages:1174-1178 www.ijvdcs.org Design of High Speed DDR3 SDRAM Controller NETHAGANI KAMALAKAR 1, G. RAMESH 2 1 PG Scholar, Khammam Institute of Technology
More informationActivating Intrusion Prevention Service
Activating Intrusion Prevention Service Intrusion Prevention Service Overview Configuring Intrusion Prevention Service Intrusion Prevention Service Overview Intrusion Prevention Service (IPS) delivers
More informationImproving the Database Logging Performance of the Snort Network Intrusion Detection Sensor
-0- Improving the Database Logging Performance of the Snort Network Intrusion Detection Sensor Lambert Schaelicke, Matthew R. Geiger, Curt J. Freeland Department of Computer Science and Engineering University
More informationTree Rule Firewall. A Thesis Submitted for the Degree of. Doctor of Philosophy. Thawatchai Chomsiri. Faculty of Engineering and Information Technology
Tree Rule Firewall A Thesis Submitted for the Degree of Doctor of Philosophy By Thawatchai Chomsiri in Faculty of Engineering and Information Technology UNIVERSITY OF TECHNOLOGY, SYDNEY 17 th November
More informationIntrusion Detection System using AI and Machine Learning Algorithm
Intrusion Detection System using AI and Machine Learning Algorithm Syam Akhil Repalle 1, Venkata Ratnam Kolluru 2 1 Student, Department of Electronics and Communication Engineering, Koneru Lakshmaiah Educational
More informationIntel Security Advanced Threat Defense Threat Detection Testing
Intel Security Advanced Threat Defense Threat Detection Testing DR150724C July 2015 Miercom www.miercom.com Contents 1.0 Executive Summary... 3 2.0 Overview... 4 Products Tested... 4 3.0 How We Did It...
More informationVirtual CMS Honey pot capturing threats In web applications 1 BADI ALEKHYA, ASSITANT PROFESSOR, DEPT OF CSE, T.J.S ENGINEERING COLLEGE
International Journal of Scientific & Engineering Research, Volume 4, Issue 4, April-2013 1492 Virtual CMS Honey pot capturing threats In web applications 1 BADI ALEKHYA, ASSITANT PROFESSOR, DEPT OF CSE,
More informationDarknet Traffic Monitoring using Honeypot
Darknet Traffic Monitoring using Honeypot 1 Hemal khorasia, 2 Mr. Girish Khilari 1 IT Systems & Network Security, 1 Gujarat Technological University, Ahmedabad, India Abstract - A "Darknet" is a portion
More informationDesign and Implementation of High Performance DDR3 SDRAM controller
Design and Implementation of High Performance DDR3 SDRAM controller Mrs. Komala M 1 Suvarna D 2 Dr K. R. Nataraj 3 Research Scholar PG Student(M.Tech) HOD, Dept. of ECE Jain University, Bangalore SJBIT,Bangalore
More informationHYBRID INTRUSION DETECTION USING SIGNATURE AND ANOMALY BASED SYSTEMS
HYBRID INTRUSION DETECTION USING SIGNATURE AND ANOMALY BASED SYSTEMS Apeksha Vartak 1 Darshika Pawaskar 2 Suraj Pangam 3 Tejal Mhatre 4 Prof. Suresh Mestry 5 1,2,3,4,5 Department of Computer Engineering,
More informationStochastic Analysis of Horizontal IP Scanning
Stochastic Analysis of Horizontal IP Scanning Derek Leonard, Zhongmei Yao,, Xiaoming Wang, and Dmitri Loguinov Internet Research Lab Department of Computer Science and Engineering Texas A&M University
More informationHOW TO CHOOSE A NEXT-GENERATION WEB APPLICATION FIREWALL
HOW TO CHOOSE A NEXT-GENERATION WEB APPLICATION FIREWALL CONTENTS EXECUTIVE SUMMARY 1 WEB APPLICATION SECURITY CHALLENGES 2 INSIST ON BEST-IN-CLASS CORE CAPABILITIES 3 HARNESSING ARTIFICIAL INTELLIGENCE
More information2. INTRUDER DETECTION SYSTEMS
1. INTRODUCTION It is apparent that information technology is the backbone of many organizations, small or big. Since they depend on information technology to drive their business forward, issues regarding
More informationDETECTING, DETERMINING AND LOCALIZING MULTIPLE ATTACKS IN WIRELESS SENSOR NETWORK - MALICIOUS NODE DETECTION AND FAULT NODE RECOVERY SYSTEM
DETECTING, DETERMINING AND LOCALIZING MULTIPLE ATTACKS IN WIRELESS SENSOR NETWORK - MALICIOUS NODE DETECTION AND FAULT NODE RECOVERY SYSTEM Rajalakshmi 1, Umamaheswari 2 and A.Vijayaraj 3 1 Department
More informationMODBUS Covert channel
MODBUS Covert channel Carlos Leonardo (cal3678@rit.edu) 1 and Daryl Johnson (dgjics@rit.edu) 2 1 and 2 Department of Computing Security, Rochester Institute of Technology, Rochester, NY, United States
More informationCompetitive Analysis. Version 1.0. February 2017
Competitive Analysis Version 1.0 February 2017 WWW.SOLIDASYSTEMS.COM Introduction This document discusses competitive advantages between Systems security appliances and other security solutions in the
More informationInternet Traffic Classification using Machine Learning
Internet Traffic Classification using Machine Learning by Alina Lapina 2018, UiO, INF5050 Alina Lapina, Master student at IFI, Full stack developer at Ciber Experis 2 Based on Thuy T. T. Nguyen, Grenville
More informationPioneer Communications Internet Services Disclosure
Pioneer Communications Internet Services Disclosure Pioneer Communications ( Pioneer ) is the leading Internet service provider for Southwest Kansas communities with a reputation for excellence that goes
More informationOklahoma State University Institute of Technology Face-to-Face Common Syllabus Fall 2017
Oklahoma State University Institute of Technology Face-to-Face Common Syllabus Fall 2017 ITD 3443 Network Security Students will provide Cyber Defense while understanding Cyber Threats. Their attack types
More informationFighting Spam, Phishing and Malware With Recurrent Pattern Detection
Fighting Spam, Phishing and Malware With Recurrent Pattern Detection White Paper September 2017 www.cyren.com 1 White Paper September 2017 Fighting Spam, Phishing and Malware With Recurrent Pattern Detection
More informationSUMMERY, CONCLUSIONS AND FUTURE WORK
Chapter - 6 SUMMERY, CONCLUSIONS AND FUTURE WORK The entire Research Work on On-Demand Routing in Multi-Hop Wireless Mobile Ad hoc Networks has been presented in simplified and easy-to-read form in six
More informationConstrained Control Allocation for. Systems with Redundant Control Effectors. Kenneth A. Bordignon. Dissertation submitted to the Faculty of the
Constrained Control Allocation for Systems with Redundant Control Effectors by Kenneth A. Bordignon Dissertation submitted to the Faculty of the Virginia Polytechnic Institute and State University in partial
More informationINCREASING THE EFFICIENCY OF NETWORK INTERFACE CARD. Amit Uppal
INCREASING THE EFFICIENCY OF NETWORK INTERFACE CARD By Amit Uppal A Thesis Submitted to the Faculty of Mississippi State University in Partial Fulfillment of the Requirements for the Degree of Master of
More informationIntel PRO/1000 PT and PF Quad Port Bypass Server Adapters for In-line Server Appliances
Technology Brief Intel PRO/1000 PT and PF Quad Port Bypass Server Adapters for In-line Server Appliances Intel PRO/1000 PT and PF Quad Port Bypass Server Adapters for In-line Server Appliances The world
More informationACCELERATED COMPLEX EVENT PROCESSING WITH GRAPHICS PROCESSING UNITS
ACCELERATED COMPLEX EVENT PROCESSING WITH GRAPHICS PROCESSING UNITS Prabodha Srimal Rodrigo Registration No. : 138230V Degree of Master of Science Department of Computer Science & Engineering University
More informationChapter 9. Firewalls
Chapter 9 Firewalls The Need For Firewalls Internet connectivity is essential Effective means of protecting LANs Inserted between the premises network and the Internet to establish a controlled link however
More informationBIOMETRIC BASED VOTING MACHINE
Impact Factor (SJIF): 5.301 International Journal of Advance Research in Engineering, Science & Technology e-issn: 2393-9877, p-issn: 2394-2444 Volume 5, Issue 4, April-2018 BIOMETRIC BASED VOTING MACHINE
More informationSWM: Simplified Wu-Manber for GPU-based Deep Packet Inspection
SWM: Simplified Wu-Manber for GPU-based Deep Packet Inspection Lucas Vespa Department of Computer Science University of Illinois at Springfield lvesp@uis.edu Ning Weng Department of Electrical and Computer
More informationPERG-Rx: An FPGA-based Pattern-Matching Engine with Limited Regular Expression Support for Large Pattern Database. Johnny Ho
PERG-Rx: An FPGA-based Pattern-Matching Engine with Limited Regular Expression Support for Large Pattern Database Johnny Ho Supervisor: Guy Lemieux Date: September 11, 2009 University of British Columbia
More informationSoft-Core Embedded Processor-Based Built-In Self- Test of FPGAs: A Case Study
Soft-Core Embedded Processor-Based Built-In Self- Test of FPGAs: A Case Study Bradley F. Dutton, Graduate Student Member, IEEE, and Charles E. Stroud, Fellow, IEEE Dept. of Electrical and Computer Engineering
More informationDetecting and Blocking Encrypted Anonymous Traffic using Deep Packet Inspection
Detecting and Blocking Encrypted Anonymous Traffic using Deep Packet Inspection Parita Chandrakant Parekh 1, Prof. Jayshree Upadhyay 2 1 PG Scholar, ITSNS, GTU PG SCHOOL, Gujarat, India 2 Assistant Professor,
More informationInternational Journal of Advance Engineering and Research Development
Scientific Journal of Impact Factor (SJIF): 4.14 e-issn : 2348-4470 p-issn : 2348-6406 International Journal of Advance Engineering and Research Development Volume 3,Issue 4,April -2016 DESIGN AND IMPLEMENTATION
More informationComputer Security Policy
Administration and Policy: Computer usage policy B 0.2/3 All systems Computer and Rules for users of the ECMWF computer systems May 1995 Table of Contents 1. The requirement for computer security... 1
More informationCHAPTER 6 PROPOSED HYBRID MEDICAL IMAGE RETRIEVAL SYSTEM USING SEMANTIC AND VISUAL FEATURES
188 CHAPTER 6 PROPOSED HYBRID MEDICAL IMAGE RETRIEVAL SYSTEM USING SEMANTIC AND VISUAL FEATURES 6.1 INTRODUCTION Image representation schemes designed for image retrieval systems are categorized into two
More informationFAQ: Privacy, Security, and Data Protection at Libraries
FAQ: Privacy, Security, and Data Protection at Libraries This FAQ was developed out of workshops and meetings connected to the Digital Privacy and Data Literacy Project (DPDL) and Brooklyn Public Library
More informationAutomated Network Anomaly Detection with Learning and QoS Mitigation. PhD Dissertation Proposal by Dennis Ippoliti
Automated Network Anomaly Detection with Learning and QoS Mitigation PhD Dissertation Proposal by Dennis Ippoliti Agenda / Table of contents Automated Network Anomaly Detection with Learning and QoS Mitigation
More informationScalable Packet Classification on FPGA
Scalable Packet Classification on FPGA 1 Deepak K. Thakkar, 2 Dr. B. S. Agarkar 1 Student, 2 Professor 1 Electronics and Telecommunication Engineering, 1 Sanjivani college of Engineering, Kopargaon, India.
More informationVisFlowConnect-IP: An Animated Link Analysis Tool For Visualizing Netflows
VisFlowConnect-IP: An Animated Link Analysis Tool For Visualizing Netflows Xiaoxin Yin*, William Yurcik, Adam Slagell SIFT Research Group (NCSA) University of Illinois at Urbana-Champaign Motivations Network
More informationCyberP3i Course Module Series
CyberP3i Course Module Series Spring 2017 Designer: Dr. Lixin Wang, Associate Professor Firewall Configuration Firewall Configuration Learning Objectives 1. Be familiar with firewalls and types of firewalls
More informationA Novel Approach to Detect and Prevent Known and Unknown Attacks in Local Area Network
International Journal of Wireless Communications, Networking and Mobile Computing 2016; 3(4): 43-47 http://www.aascit.org/journal/wcnmc ISSN: 2381-1137 (Print); ISSN: 2381-1145 (Online) A Novel Approach
More informationA Flexible Design of Network on Chip Router based on Handshaking Communication Mechanism
A Flexible Design of Network on Chip Router based on Handshaking Communication Mechanism Seyyed Amir Asghari, Hossein Pedram and Mohammad Khademi 2 Amirkabir University of Technology 2 Shahid Beheshti
More informationProtocol Data Hiding. By Chet Hosmer Article Posted: March 06, 2012
Protocol Data Hiding By Chet Hosmer Article Posted: March 06, 2012 On Cinco de Mayo in 1997, which happened to be the first Monday in May that year, the Hacker Publication First Monday included an article
More informationLarge-scale Multi-flow Regular Expression Matching on FPGA*
212 IEEE 13th International Conference on High Performance Switching and Routing Large-scale Multi-flow Regular Expression Matching on FPGA* Yun Qu Ming Hsieh Dept. of Electrical Eng. University of Southern
More informationACS-3921/ Computer Security And Privacy. Chapter 9 Firewalls and Intrusion Prevention Systems
ACS-3921/4921-001 Computer Security And Privacy Chapter 9 Firewalls and Intrusion Prevention Systems ACS-3921/4921-001 Slides Used In The Course A note on the use of these slides: These slides has been
More informationIndex Terms- Field Programmable Gate Array, Content Addressable memory, Intrusion Detection system.
Dynamic Based Reconfigurable Content Addressable Memory for FastString Matching N.Manonmani 1, K.Suman 2, C.Udhayakumar 3 Dept of ECE, Sri Eshwar College of Engineering, Kinathukadavu, Coimbatore, India1
More informationUsing Game Theory To Solve Network Security. A brief survey by Willie Cohen
Using Game Theory To Solve Network Security A brief survey by Willie Cohen Network Security Overview By default networks are very insecure There are a number of well known methods for securing a network
More informationLecture 18: Communication Models and Architectures: Interconnection Networks
Design & Co-design of Embedded Systems Lecture 18: Communication Models and Architectures: Interconnection Networks Sharif University of Technology Computer Engineering g Dept. Winter-Spring 2008 Mehdi
More informationNetwork Interface Architecture and Prototyping for Chip and Cluster Multiprocessors
University of Crete School of Sciences & Engineering Computer Science Department Master Thesis by Michael Papamichael Network Interface Architecture and Prototyping for Chip and Cluster Multiprocessors
More informationManaging Latency in IPS Networks
Revision C McAfee Network Security Platform (Managing Latency in IPS Networks) Managing Latency in IPS Networks McAfee Network Security Platform provides you with a set of pre-defined recommended settings
More informationFault Tolerant and Secure Architectures for On Chip Networks With Emerging Interconnect Technologies. Mohsin Y Ahmed Conlan Wesson
Fault Tolerant and Secure Architectures for On Chip Networks With Emerging Interconnect Technologies Mohsin Y Ahmed Conlan Wesson Overview NoC: Future generation of many core processor on a single chip
More informationPerforming MapReduce on Data Centers with Hierarchical Structures
INT J COMPUT COMMUN, ISSN 1841-9836 Vol.7 (212), No. 3 (September), pp. 432-449 Performing MapReduce on Data Centers with Hierarchical Structures Z. Ding, D. Guo, X. Chen, X. Luo Zeliu Ding, Deke Guo,
More informationBehavior-Triggered Answer Reconfirmation for Spam Detection in Online Surveys
Technical Disclosure Commons Defensive Publications Series April 28, 2015 Behavior-Triggered Answer Reconfirmation for Spam Detection in Online Surveys Kang Li Follow this and additional works at: http://www.tdcommons.org/dpubs_series
More informationSupra-linear Packet Processing Performance with Intel Multi-core Processors
White Paper Dual-Core Intel Xeon Processor LV 2.0 GHz Communications and Networking Applications Supra-linear Packet Processing Performance with Intel Multi-core Processors 1 Executive Summary Advances
More informationConfigurable String Matching Hardware for Speeding up Intrusion Detection
Configurable String Matching Hardware for Speeding up Intrusion Detection Monther Aldwairi, Thomas Conte, Paul Franzon Dec 6, 2004 North Carolina State University {mmaldwai, conte, paulf}@ncsu.edu www.ece.ncsu.edu/erl
More informationAgilent E2929A/B Opt. 200 PCI-X Performance Optimizer. User s Guide
Agilent E2929A/B Opt. 200 PCI-X Performance Optimizer User s Guide S1 Important Notice All information in this document is valid for both Agilent E2929A and Agilent E2929B testcards. Copyright 2001 Agilent
More informationB.H.GARDI COLLEGE OF ENGINEERING & TECHNOLOGY (MCA Dept.) Parallel Database Database Management System - 2
Introduction :- Today single CPU based architecture is not capable enough for the modern database that are required to handle more demanding and complex requirements of the users, for example, high performance,
More informationOn exploiting spatial reuse in wireless ad hoc networks
University of Wollongong Research Online University of Wollongong Thesis Collection 1954-2016 University of Wollongong Thesis Collections 2008 On exploiting spatial reuse in wireless ad hoc networks Ziguang
More informationControl of jitter buffer size using machine learning
Technical Disclosure Commons Defensive Publications Series December 06, 2017 Control of jitter buffer size using machine learning Ivo Creusen Oliver Walter Henrik Lundin Follow this and additional works
More information6.9. Communicating to the Outside World: Cluster Networking
6.9 Communicating to the Outside World: Cluster Networking This online section describes the networking hardware and software used to connect the nodes of cluster together. As there are whole books and
More informationA CORDIC Algorithm with Improved Rotation Strategy for Embedded Applications
A CORDIC Algorithm with Improved Rotation Strategy for Embedded Applications Kui-Ting Chen Research Center of Information, Production and Systems, Waseda University, Fukuoka, Japan Email: nore@aoni.waseda.jp
More informationESOP CIRCUIT MINIMIZATION BASED ON THE FUNCTION ON-SET. Likai Chai
ESOP CIRCUIT MINIMIZATION BASED ON THE FUNCTION ON-SET By Likai Chai A Thesis Submitted to the Faculty of Mississippi State University in Partial Fulfillment of the Requirements for the Degree of Master
More informationQuestion 1: What steps can organizations take to prevent incidents of cybercrime? Answer 1:
Cybercrime Question 1: What steps can organizations take to prevent incidents of cybercrime? Answer 1: Organizations can prevent cybercrime from occurring through the proper use of personnel, resources,
More informationThe Structure and Properties of Clique Graphs of Regular Graphs
The University of Southern Mississippi The Aquila Digital Community Master's Theses 1-014 The Structure and Properties of Clique Graphs of Regular Graphs Jan Burmeister University of Southern Mississippi
More informationCHAPTER THREE INFORMATION RETRIEVAL SYSTEM
CHAPTER THREE INFORMATION RETRIEVAL SYSTEM 3.1 INTRODUCTION Search engine is one of the most effective and prominent method to find information online. It has become an essential part of life for almost
More informationTwo Level State Machine Architecture for Content Inspection Engines
Two Level State Machine Architecture for Content Inspection Engines Mohammadreza Yazdani Wojciech Fraczak Feliks Welfeld Ioannis Lambadaris Department of Systems and Computer Engineering Carleton University,
More informationEFFICIENT ATTACKS ON HOMOPHONIC SUBSTITUTION CIPHERS
EFFICIENT ATTACKS ON HOMOPHONIC SUBSTITUTION CIPHERS A Project Report Presented to The faculty of the Department of Computer Science San Jose State University In Partial Fulfillment of the Requirements
More information744 Motooka Nishi-ku Fukuoka , Japan Phone/Fax:
September 12, 2009 To whom it may concern: I am Dr. Masafumi Yamashita, a professor at the Department of Informatics, Graduate School of Information Science and Electrical Engineering, Kyushu University,
More informationPart IV. Chapter 15 - Introduction to MIMD Architectures
D. Sima, T. J. Fountain, P. Kacsuk dvanced Computer rchitectures Part IV. Chapter 15 - Introduction to MIMD rchitectures Thread and process-level parallel architectures are typically realised by MIMD (Multiple
More informationLEoNIDS: a Low-latency and Energyefficient Intrusion Detection System
LEoNIDS: a Low-latency and Energyefficient Intrusion Detection System Nikos Tsikoudis Thesis Supervisor: Evangelos Markatos June 2013 Heraklion, Greece Low-Power Design Low-power systems receive significant
More informationExtensible Network Configuration and Communication Framework
Extensible Network Configuration and Communication Framework Todd Sproull and John Lockwood Applied Research Laboratory Department of Computer Science and Engineering: Washington University in Saint Louis
More informationSCP SC Network Defense and Countermeasures (NDC) Exam.
SCP SC0-402 Network Defense and Countermeasures (NDC) Exam TYPE: DEMO http://www.examskey.com/sc0-402.html Examskey SCP SC0-402 exam demo product is here for you to test the quality of the product. This
More informationIP Profiler. Tracking the activity and behavior of an IP address. Author: Fred Thiele (GCIA, CISSP) Contributing Editor: David Mackey (GCIH, CISSP)
Security Intelligence June 2005 IP Profiler Tracking the activity and behavior of an IP address Author: Fred Thiele (GCIA, CISSP) Contributing Editor: David Mackey (GCIH, CISSP) Page 2 Contents 3 Profiling
More informationMechanisms for Database Intrusion Detection and Response. Michael Sintim - Koree SE 521 March 6, 2013.
Mechanisms for Database Intrusion Detection and Response Michael Sintim - Koree SE 521 March 6, 2013. Article Title: Mechanisms for Database Intrusion Detection and Response Authors: Ashish Kamra, Elisa
More information5. Execute the attack and obtain unauthorized access to the system.
Describe how a combination of preventive, detective, and corrective controls can be employed to provide reasonable assurance about information security. Before discussing the preventive, detective, and
More informationINTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET)
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 6367(Print) ISSN 0976 6375(Online)
More informationArea And Power Optimized One-Dimensional Median Filter
Area And Power Optimized One-Dimensional Median Filter P. Premalatha, Ms. P. Karthika Rani, M.E., PG Scholar, Assistant Professor, PA College of Engineering and Technology, PA College of Engineering and
More informationK-Nearest-Neighbours with a Novel Similarity Measure for Intrusion Detection
K-Nearest-Neighbours with a Novel Similarity Measure for Intrusion Detection Zhenghui Ma School of Computer Science The University of Birmingham Edgbaston, B15 2TT Birmingham, UK Ata Kaban School of Computer
More informationIntrusion Detection and Prevention in Internet of Things
IJSRD National Conference on Advances in Computer Science Engineering & Technology May 2017 ISSN: 2321-0613 Intrusion Detection and Prevention in Internet of Things Mr. Maulik Bhensdadia 1 Mr. Aditya Kumar
More informationAn optically transparent ultra high speed LAN-ring employing OTDM
An optically transparent ultra high speed LAN-ring employing OTDM K. Bengi, G. Remsak, H.R. van As Vienna University of Technology, Institute of Communication Networks Gusshausstrasse 25/388, A-1040 Vienna,
More information