scholarly journals High Throughput Signature Based Platform for Network Intrusion Detection

Author(s):  
José Manuel Bande Serrano ◽  
José Hernández Palancar ◽  
René Cumplido
2009 ◽  
Vol 32 (3) ◽  
pp. 397-405 ◽  
Author(s):  
Wen‐Jyi Hwang ◽  
Chien‐Min Ou ◽  
Ying‐Nan Shih ◽  
Chia‐Tien Dan Lo

2011 ◽  
Vol 403-408 ◽  
pp. 1985-1988
Author(s):  
Jing Jiao Li ◽  
Ho Cholman ◽  
Yong Chen ◽  
Song Ho Pak

Intrusion detection for network security is an application area demanding high throughput. The pattern matching in intrusion detection requires extremely high performance to process string matching. Most of pattern matching using software has many time complexities and cannot reach the requirements of high throughput. The pattern matching using hardware considerably improves the speed of matching and has several other advantages. This paper describes a FPGA-based pattern matching architecture, using hashing method called XOR Hashing. The proposed method updates new patterns without reconfiguration and processes the collision and has high matching performance. The proposed system implements the pattern matching by using Snort rule-set, an open source Network Intrusion Detection and has simulation processing on PC. Compared with existing hardware method, the results explained that our method has relatively high performance for the pattern matching and can else process the pattern matching with high performance on low–cost FPGA device.


2020 ◽  
Vol 38 (1B) ◽  
pp. 6-14
Author(s):  
ٍٍSarah M. Shareef ◽  
Soukaena H. Hashim

Network intrusion detection system (NIDS) is a software system which plays an important role to protect network system and can be used to monitor network activities to detect different kinds of attacks from normal behavior in network traffics. A false alarm is one of the most identified problems in relation to the intrusion detection system which can be a limiting factor for the performance and accuracy of the intrusion detection system. The proposed system involves mining techniques at two sequential levels, which are: at the first level Naïve Bayes algorithm is used to detect abnormal activity from normal behavior. The second level is the multinomial logistic regression algorithm of which is used to classify abnormal activity into main four attack types in addition to a normal class. To evaluate the proposed system, the KDDCUP99 dataset of the intrusion detection system was used and K-fold cross-validation was performed. The experimental results show that the performance of the proposed system is improved with less false alarm rate.


Sign in / Sign up

Export Citation Format

Share Document