Artículos relacionados a Architecture Support for Intrusion Detection systems:...

Architecture Support for Intrusion Detection systems: Hardware and Software techniques to improve the performance and area efficiency of an IDS - Tapa blanda

 
9783659612770: Architecture Support for Intrusion Detection systems: Hardware and Software techniques to improve the performance and area efficiency of an IDS

Sinopsis

System security is a prerequisite for efficient day-to-day transactions. As a consequence, Intrusion Detection Systems (IDS) are commonly used to provide an effective security ring to systems in a network. An IDS operates by inspecting packets flowing in the network for malicious content. To do so, an IDS like Snort[49] compares bytes in a packet with a database of prior reported attacks. This functionality can also be viewed as string matching of the packet bytes with the attack string database. In this thesis we explore hardware and software techniques to accelerate string matching in an IDS. We propose mechanisms/hueristics that can be deployed either in a custom ASIC or a network processor and/or a commodity CPU. Our performance results indicate clear benefits in using our proposed scheme over the state-of-the-art.

"Sinopsis" puede pertenecer a otra edición de este libro.

Reseña del editor

System security is a prerequisite for efficient day-to-day transactions. As a consequence, Intrusion Detection Systems (IDS) are commonly used to provide an effective security ring to systems in a network. An IDS operates by inspecting packets flowing in the network for malicious content. To do so, an IDS like Snort[49] compares bytes in a packet with a database of prior reported attacks. This functionality can also be viewed as string matching of the packet bytes with the attack string database. In this thesis we explore hardware and software techniques to accelerate string matching in an IDS. We propose mechanisms/hueristics that can be deployed either in a custom ASIC or a network processor and/or a commodity CPU. Our performance results indicate clear benefits in using our proposed scheme over the state-of-the-art.

Biografía del autor

Govind currently is a post-doctoral research fellow at the University of Edinburgh. Govind completed his Doctorate from Universitat Politecnica De Catalunya, Barcelona in 2012. He completed his Master of Science in Engineering from the Indian Institute of Science, Bangalore. He also completed his Bachelors from MNIT, Jaipur.

"Sobre este título" puede pertenecer a otra edición de este libro.

  • EditorialLAP LAMBERT Academic Publishing
  • Año de publicación2014
  • ISBN 10 3659612774
  • ISBN 13 9783659612770
  • EncuadernaciónTapa blanda
  • IdiomaInglés
  • Número de páginas160
  • Contacto del fabricanteno disponible

Comprar usado

Condición: Como Nuevo
Like New
Ver este artículo

EUR 29,39 gastos de envío desde Reino Unido a España

Destinos, gastos y plazos de envío

Comprar nuevo

Ver este artículo

EUR 19,49 gastos de envío desde Alemania a España

Destinos, gastos y plazos de envío

Resultados de la búsqueda para Architecture Support for Intrusion Detection systems:...

Imagen del vendedor

Govind Sreekar Shenoy
Publicado por LAP LAMBERT Academic Publishing, 2014
ISBN 10: 3659612774 ISBN 13: 9783659612770
Nuevo Tapa blanda
Impresión bajo demanda

Librería: moluna, Greven, Alemania

Calificación del vendedor: 5 de 5 estrellas Valoración 5 estrellas, Más información sobre las valoraciones de los vendedores

Condición: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Autor/Autorin: Sreekar Shenoy GovindGovind currently is a post-doctoral research fellow at the University of Edinburgh. Govind completed his Doctorate from Universitat Politecnica De Catalunya, Barcelona in 2012. He completed his Master of Science . Nº de ref. del artículo: 5168330

Contactar al vendedor

Comprar nuevo

EUR 43,20
Convertir moneda
Gastos de envío: EUR 19,49
De Alemania a España
Destinos, gastos y plazos de envío

Cantidad disponible: Más de 20 disponibles

Añadir al carrito

Imagen del vendedor

Govind Sreekar Shenoy
ISBN 10: 3659612774 ISBN 13: 9783659612770
Nuevo Taschenbuch
Impresión bajo demanda

Librería: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Alemania

Calificación del vendedor: 5 de 5 estrellas Valoración 5 estrellas, Más información sobre las valoraciones de los vendedores

Taschenbuch. Condición: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -System security is a prerequisite for efficient day-to-day transactions. As a consequence, Intrusion Detection Systems (IDS) are commonly used to provide an effective security ring to systems in a network. An IDS operates by inspecting packets flowing in the network for malicious content. To do so, an IDS like Snort[49] compares bytes in a packet with a database of prior reported attacks. This functionality can also be viewed as string matching of the packet bytes with the attack string database. In this thesis we explore hardware and software techniques to accelerate string matching in an IDS. We propose mechanisms/hueristics that can be deployed either in a custom ASIC or a network processor and/or a commodity CPU. Our performance results indicate clear benefits in using our proposed scheme over the state-of-the-art. 160 pp. Englisch. Nº de ref. del artículo: 9783659612770

Contactar al vendedor

Comprar nuevo

EUR 51,90
Convertir moneda
Gastos de envío: EUR 11,00
De Alemania a España
Destinos, gastos y plazos de envío

Cantidad disponible: 2 disponibles

Añadir al carrito

Imagen del vendedor

Govind Sreekar Shenoy
Publicado por LAP LAMBERT Academic Publishing, 2014
ISBN 10: 3659612774 ISBN 13: 9783659612770
Nuevo Taschenbuch
Impresión bajo demanda

Librería: AHA-BUCH GmbH, Einbeck, Alemania

Calificación del vendedor: 5 de 5 estrellas Valoración 5 estrellas, Más información sobre las valoraciones de los vendedores

Taschenbuch. Condición: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - System security is a prerequisite for efficient day-to-day transactions. As a consequence, Intrusion Detection Systems (IDS) are commonly used to provide an effective security ring to systems in a network. An IDS operates by inspecting packets flowing in the network for malicious content. To do so, an IDS like Snort[49] compares bytes in a packet with a database of prior reported attacks. This functionality can also be viewed as string matching of the packet bytes with the attack string database. In this thesis we explore hardware and software techniques to accelerate string matching in an IDS. We propose mechanisms/hueristics that can be deployed either in a custom ASIC or a network processor and/or a commodity CPU. Our performance results indicate clear benefits in using our proposed scheme over the state-of-the-art. Nº de ref. del artículo: 9783659612770

Contactar al vendedor

Comprar nuevo

EUR 51,90
Convertir moneda
Gastos de envío: EUR 11,99
De Alemania a España
Destinos, gastos y plazos de envío

Cantidad disponible: 1 disponibles

Añadir al carrito

Imagen del vendedor

Govind Sreekar Shenoy
ISBN 10: 3659612774 ISBN 13: 9783659612770
Nuevo Taschenbuch

Librería: buchversandmimpf2000, Emtmannsberg, BAYE, Alemania

Calificación del vendedor: 5 de 5 estrellas Valoración 5 estrellas, Más información sobre las valoraciones de los vendedores

Taschenbuch. Condición: Neu. Neuware -System security is a prerequisite for efficient day-to-day transactions. As a consequence, Intrusion Detection Systems (IDS) are commonly used to provide an effective security ring to systems in a network. An IDS operates by inspecting packets flowing in the network for malicious content. To do so, an IDS like Snort[49] compares bytes in a packet with a database of prior reported attacks. This functionality can also be viewed as string matching of the packet bytes with the attack string database. In this thesis we explore hardware and software techniques to accelerate string matching in an IDS. We propose mechanisms/hueristics that can be deployed either in a custom ASIC or a network processor and/or a commodity CPU. Our performance results indicate clear benefits in using our proposed scheme over the state-of-the-art.Books on Demand GmbH, Überseering 33, 22297 Hamburg 160 pp. Englisch. Nº de ref. del artículo: 9783659612770

Contactar al vendedor

Comprar nuevo

EUR 51,90
Convertir moneda
Gastos de envío: EUR 35,00
De Alemania a España
Destinos, gastos y plazos de envío

Cantidad disponible: 2 disponibles

Añadir al carrito

Imagen de archivo

Sreekar Shenoy, Govind
Publicado por LAP LAMBERT Academic Publishing, 2014
ISBN 10: 3659612774 ISBN 13: 9783659612770
Antiguo o usado Paperback

Librería: Mispah books, Redhill, SURRE, Reino Unido

Calificación del vendedor: 4 de 5 estrellas Valoración 4 estrellas, Más información sobre las valoraciones de los vendedores

Paperback. Condición: Like New. Like New. book. Nº de ref. del artículo: ERICA75836596127745

Contactar al vendedor

Comprar usado

EUR 111,40
Convertir moneda
Gastos de envío: EUR 29,39
De Reino Unido a España
Destinos, gastos y plazos de envío

Cantidad disponible: 1 disponibles

Añadir al carrito