Acta Informatica Pragensia 2012, 1(1), 50-59 | DOI: 10.18267/j.aip.57082
Intrusion Detection Architecture Utilizing Graphics Processors
- Department of Computers and Informatics, Faculty of Electrical Engineering and Informatics, Technical University of Ko¹ice Letnį 9, 042 00 Ko¹ice, Slovak Republic
With the thriving technology and the great increase in the usage of computer networks, the risk of having these network to be under attacks have been increased. Number of techniques have been created and designed to help in detecting and/or preventing such attacks. One common technique is the use of Intrusion Detection Systems (IDS). Today, number of open sources and commercial IDS are available to match enterprises requirements. However, the performance of these systems is still the main concern. This paper examines perceptions of intrusion detection architecture implementation, resulting from the use of graphics processor. It discusses recent research activities, developments and problems of operating systems security. Some exploratory evidence is presented that shows capabilities of using graphical processors and intrusion detection systems. The focus is on how knowledge experienced throughout the graphics processor inclusion has played out in the design of intrusion detection architecture that is seen as an opportunity to strengthen research expertise.
Keywords: Attacks, Intrusion Detection Systems (IDS), Performance, Traffic, Suricata, GPU
Received: October 19, 2012; Revised: December 7, 2012; Accepted: December 20, 2012; Published: December 29, 2012 Show citation
References
- ALHOMOUD, A., MUNIR, R., DISSO, J.P., AWAN, I., AL-DHELAAN, A. Procedia Computer Science, Volume 5: Performance Evaluation Study of Intrusion Detection Systems, pp. 173-180, 2011. Go to original source...
- DAY, D., BURNS, B. Proceedings of the 5th International Conference on Digital Society: A Performance Analysis of Snort and Suricata NetworkIntrusion Detection and Prevention Engines, pp. 187-192, 2011, ISBN 978-1-61208-116-8.
- Emerging Threats: Rule Documentation, 2011, URL http://doc.emergingthreats.net/
- KOLLER, T. Compute Unified Device Architecture (CUDA), 2012, URL http://ps.fb12.uni-siegen.de/downloads/Seminare/multicore-ws2011/koller.pdf/
- KOVACH, N., MULLINS, B.Proceedings of the 5th International Conference on Information Warfare and Security: Malware Detection via a Graphics Processing Unit, Wright Patterson AFB, Ohio, pp. 212-215, 2010.
- Snort Official Website, 2012, URL http://www.snort.org/
- VASILIADIS, G., POLYCHRONAKIS, M., ANTONATOS, S., MARKATOS, E., IOANNIDIS, S. Recent Advances in Intrusion Detection, Volume 5758: Regular Expression Matching on Graphics Hardware for Intrusion Detection, St Malo, France, pp. 265-283, 2009. Go to original source...
- WU C., TIN, J., CAI, Z., ZHU, E., CHENG, J. Security Technology, Volume 58: An Efficient Pre-filtering Mechanism for Parallel Intrusion Detection Based on Many-Core GPU, Jeju Isl, South Korea, pp. 298-305, 2009. Go to original source...
- ZHANG, X., ZHAO, C., WU, J., SONG, C. Theoretical and Mathematical Foundations of Computer Science, Volume 164: A GPU-RSVM Based Intrusion Detection Classifier, Singapore, Malaysia, pp. 92-100, 2011. Go to original source...
This is an open access article distributed under the terms of the Creative Commons Attribution 4.0 International License (CC BY 4.0), which permits use, distribution, and reproduction in any medium, provided the original publication is properly cited. No use, distribution or reproduction is permitted which does not comply with these terms.