2016 IEEE Long Island Systems, Applications and Technology Conference (LISAT) 2016
DOI: 10.1109/lisat.2016.7494100
|View full text |Cite
|
Sign up to set email alerts
|

Network intrusion detection using hardware techniques: A review

Abstract: -The increasing amount of network throughput and security threat makes intrusion detection a major research problem. In the literature, intrusion detection has been approached by either a hardware or software technique. This paper reviews and compares hardware based techniques that are commonly used in intrusion detection systems with a special emphasis on modern hardware platforms such as FPGA, GPU, many-core processors and ASIC. It also provides a detailed comparison between these hardware solution platforms… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 31 publications
0
3
0
Order By: Relevance
“…Additionally, datasets and EU standards (e.g., the General Data Protection Regulation -GDPR) for data collection and protection are addressed in this review. Other reviews considering specific aspects of this field include the work described in [27], which focuses on hardware techniques for IDS implementation; the paper presented in [28], which considers only immunity-based approaches; and the survey published in [29], which describes network security techniques for supervisory control and data acquisition systems.…”
Section: A Previous Surveysmentioning
confidence: 99%
“…Additionally, datasets and EU standards (e.g., the General Data Protection Regulation -GDPR) for data collection and protection are addressed in this review. Other reviews considering specific aspects of this field include the work described in [27], which focuses on hardware techniques for IDS implementation; the paper presented in [28], which considers only immunity-based approaches; and the survey published in [29], which describes network security techniques for supervisory control and data acquisition systems.…”
Section: A Previous Surveysmentioning
confidence: 99%
“…Detection can be logged as an event of interest or trigger a defence mechanism to deal with the event in real-time. Mainstream IDSs use pattern matching, string matching, multi-match packet classification and regular expressions for operation [1]. These computationally complex approaches are often implemented using hardware accelerators on FPGAs or ASICs, or run on highly parallel multi-core processors or GPUs to enable them to process network traffic at the high rates required.…”
Section: Introductionmentioning
confidence: 99%
“…Solutions for high speed deep packet inspection can be roughly divided into software solutions [7] and hardware solutions [8][9][10][11][12]. The former focus on developing optimized algorithms and data structures to represent the signatures while the latter aim at accelerating the matching process using specialized structures [10][11].…”
Section: Introductionmentioning
confidence: 99%