Artículos relacionados a Architecture Support for Intrusion Detection systems:...

Architecture Support for Intrusion Detection systems: Hardware and Software techniques to improve the performance and area efficiency of an IDS - Tapa blanda

 
9783659612770: Architecture Support for Intrusion Detection systems: Hardware and Software techniques to improve the performance and area efficiency of an IDS

Sinopsis

System security is a prerequisite for efficient day-to-day transactions. As a consequence, Intrusion Detection Systems (IDS) are commonly used to provide an effective security ring to systems in a network. An IDS operates by inspecting packets flowing in the network for malicious content. To do so, an IDS like Snort[49] compares bytes in a packet with a database of prior reported attacks. This functionality can also be viewed as string matching of the packet bytes with the attack string database. In this thesis we explore hardware and software techniques to accelerate string matching in an IDS. We propose mechanisms/hueristics that can be deployed either in a custom ASIC or a network processor and/or a commodity CPU. Our performance results indicate clear benefits in using our proposed scheme over the state-of-the-art.

"Sinopsis" puede pertenecer a otra edición de este libro.

Reseña del editor

System security is a prerequisite for efficient day-to-day transactions. As a consequence, Intrusion Detection Systems (IDS) are commonly used to provide an effective security ring to systems in a network. An IDS operates by inspecting packets flowing in the network for malicious content. To do so, an IDS like Snort[49] compares bytes in a packet with a database of prior reported attacks. This functionality can also be viewed as string matching of the packet bytes with the attack string database. In this thesis we explore hardware and software techniques to accelerate string matching in an IDS. We propose mechanisms/hueristics that can be deployed either in a custom ASIC or a network processor and/or a commodity CPU. Our performance results indicate clear benefits in using our proposed scheme over the state-of-the-art.

Biografía del autor

Govind currently is a post-doctoral research fellow at the University of Edinburgh. Govind completed his Doctorate from Universitat Politecnica De Catalunya, Barcelona in 2012. He completed his Master of Science in Engineering from the Indian Institute of Science, Bangalore. He also completed his Bachelors from MNIT, Jaipur.

"Sobre este título" puede pertenecer a otra edición de este libro.

Comprar usado

Condición: Como Nuevo
Like New
Ver este artículo

EUR 28,92 gastos de envío desde Reino Unido a Estados Unidos de America

Destinos, gastos y plazos de envío

Comprar nuevo

Ver este artículo

EUR 23,00 gastos de envío desde Alemania a Estados Unidos de America

Destinos, gastos y plazos de envío

Resultados de la búsqueda para Architecture Support for Intrusion Detection systems:...

Imagen del vendedor

Govind Sreekar Shenoy
ISBN 10: 3659612774 ISBN 13: 9783659612770
Nuevo Taschenbuch
Impresión bajo demanda

Librería: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Alemania

Calificación del vendedor: 5 de 5 estrellas Valoración 5 estrellas, Más información sobre las valoraciones de los vendedores

Taschenbuch. Condición: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -System security is a prerequisite for efficient day-to-day transactions. As a consequence, Intrusion Detection Systems (IDS) are commonly used to provide an effective security ring to systems in a network. An IDS operates by inspecting packets flowing in the network for malicious content. To do so, an IDS like Snort[49] compares bytes in a packet with a database of prior reported attacks. This functionality can also be viewed as string matching of the packet bytes with the attack string database. In this thesis we explore hardware and software techniques to accelerate string matching in an IDS. We propose mechanisms/hueristics that can be deployed either in a custom ASIC or a network processor and/or a commodity CPU. Our performance results indicate clear benefits in using our proposed scheme over the state-of-the-art. 160 pp. Englisch. Nº de ref. del artículo: 9783659612770

Contactar al vendedor

Comprar nuevo

EUR 51,90
Convertir moneda
Gastos de envío: EUR 23,00
De Alemania a Estados Unidos de America
Destinos, gastos y plazos de envío

Cantidad disponible: 2 disponibles

Añadir al carrito

Imagen del vendedor

Govind Sreekar Shenoy
Publicado por LAP LAMBERT Academic Publishing, 2014
ISBN 10: 3659612774 ISBN 13: 9783659612770
Nuevo Tapa blanda
Impresión bajo demanda

Librería: moluna, Greven, Alemania

Calificación del vendedor: 5 de 5 estrellas Valoración 5 estrellas, Más información sobre las valoraciones de los vendedores

Condición: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Autor/Autorin: Sreekar Shenoy GovindGovind currently is a post-doctoral research fellow at the University of Edinburgh. Govind completed his Doctorate from Universitat Politecnica De Catalunya, Barcelona in 2012. He completed his Master of Science . Nº de ref. del artículo: 5168330

Contactar al vendedor

Comprar nuevo

EUR 43,20
Convertir moneda
Gastos de envío: EUR 48,99
De Alemania a Estados Unidos de America
Destinos, gastos y plazos de envío

Cantidad disponible: Más de 20 disponibles

Añadir al carrito

Imagen del vendedor

Govind Sreekar Shenoy
ISBN 10: 3659612774 ISBN 13: 9783659612770
Nuevo Taschenbuch

Librería: buchversandmimpf2000, Emtmannsberg, BAYE, Alemania

Calificación del vendedor: 5 de 5 estrellas Valoración 5 estrellas, Más información sobre las valoraciones de los vendedores

Taschenbuch. Condición: Neu. Neuware -System security is a prerequisite for efficient day-to-day transactions. As a consequence, Intrusion Detection Systems (IDS) are commonly used to provide an effective security ring to systems in a network. An IDS operates by inspecting packets flowing in the network for malicious content. To do so, an IDS like Snort[49] compares bytes in a packet with a database of prior reported attacks. This functionality can also be viewed as string matching of the packet bytes with the attack string database. In this thesis we explore hardware and software techniques to accelerate string matching in an IDS. We propose mechanisms/hueristics that can be deployed either in a custom ASIC or a network processor and/or a commodity CPU. Our performance results indicate clear benefits in using our proposed scheme over the state-of-the-art.Books on Demand GmbH, Überseering 33, 22297 Hamburg 160 pp. Englisch. Nº de ref. del artículo: 9783659612770

Contactar al vendedor

Comprar nuevo

EUR 51,90
Convertir moneda
Gastos de envío: EUR 60,00
De Alemania a Estados Unidos de America
Destinos, gastos y plazos de envío

Cantidad disponible: 2 disponibles

Añadir al carrito

Imagen del vendedor

Govind Sreekar Shenoy
Publicado por LAP LAMBERT Academic Publishing, 2014
ISBN 10: 3659612774 ISBN 13: 9783659612770
Nuevo Taschenbuch
Impresión bajo demanda

Librería: AHA-BUCH GmbH, Einbeck, Alemania

Calificación del vendedor: 5 de 5 estrellas Valoración 5 estrellas, Más información sobre las valoraciones de los vendedores

Taschenbuch. Condición: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - System security is a prerequisite for efficient day-to-day transactions. As a consequence, Intrusion Detection Systems (IDS) are commonly used to provide an effective security ring to systems in a network. An IDS operates by inspecting packets flowing in the network for malicious content. To do so, an IDS like Snort[49] compares bytes in a packet with a database of prior reported attacks. This functionality can also be viewed as string matching of the packet bytes with the attack string database. In this thesis we explore hardware and software techniques to accelerate string matching in an IDS. We propose mechanisms/hueristics that can be deployed either in a custom ASIC or a network processor and/or a commodity CPU. Our performance results indicate clear benefits in using our proposed scheme over the state-of-the-art. Nº de ref. del artículo: 9783659612770

Contactar al vendedor

Comprar nuevo

EUR 51,90
Convertir moneda
Gastos de envío: EUR 61,28
De Alemania a Estados Unidos de America
Destinos, gastos y plazos de envío

Cantidad disponible: 1 disponibles

Añadir al carrito

Imagen de archivo

Sreekar Shenoy, Govind
Publicado por LAP LAMBERT Academic Publishing, 2014
ISBN 10: 3659612774 ISBN 13: 9783659612770
Antiguo o usado Paperback

Librería: Mispah books, Redhill, SURRE, Reino Unido

Calificación del vendedor: 4 de 5 estrellas Valoración 4 estrellas, Más información sobre las valoraciones de los vendedores

Paperback. Condición: Like New. Like New. book. Nº de ref. del artículo: ERICA75836596127745

Contactar al vendedor

Comprar usado

EUR 109,63
Convertir moneda
Gastos de envío: EUR 28,92
De Reino Unido a Estados Unidos de America
Destinos, gastos y plazos de envío

Cantidad disponible: 1 disponibles

Añadir al carrito