Power efficient architecture for network intrusion detection system

Venkataramesh Bontupalli, Raqibul Hasan, T. Taha
{"title":"Power efficient architecture for network intrusion detection system","authors":"Venkataramesh Bontupalli, Raqibul Hasan, T. Taha","doi":"10.1109/NAECON.2014.7045811","DOIUrl":null,"url":null,"abstract":"With the rise in cyber-attacks on computing systems and the rapid increase in use of mobile systems, it is essential to secure these mobile devices. Given that these systems can roam on multiple networks, with no guarantee on security adopted on each network, including Intrusion Detection Systems (IDS) on the mobile platforms can be beneficial in preventing cyber-attacks. One of the key problems with implementing IDS on mobile platforms is the increased power consumption. This paper presents low power circuits that implement the string matching tasks within the Snort IDS. These tasks can take up to 80% of the power consumed for Snort. The circuit presented is based on memristor crossbars and evaluate Snort rules at 0.013mW per signature. The circuits are easy to program, utilizing only two resistance states for the memristors. They are highly parallel and dense, utilizing a brute-force string matching algorithm. These circuits could additionally be utilized for other string matching operations.","PeriodicalId":318539,"journal":{"name":"NAECON 2014 - IEEE National Aerospace and Electronics Conference","volume":"18 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"NAECON 2014 - IEEE National Aerospace and Electronics Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NAECON.2014.7045811","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 9

Abstract

With the rise in cyber-attacks on computing systems and the rapid increase in use of mobile systems, it is essential to secure these mobile devices. Given that these systems can roam on multiple networks, with no guarantee on security adopted on each network, including Intrusion Detection Systems (IDS) on the mobile platforms can be beneficial in preventing cyber-attacks. One of the key problems with implementing IDS on mobile platforms is the increased power consumption. This paper presents low power circuits that implement the string matching tasks within the Snort IDS. These tasks can take up to 80% of the power consumed for Snort. The circuit presented is based on memristor crossbars and evaluate Snort rules at 0.013mW per signature. The circuits are easy to program, utilizing only two resistance states for the memristors. They are highly parallel and dense, utilizing a brute-force string matching algorithm. These circuits could additionally be utilized for other string matching operations.
一种高效节能的网络入侵检测系统架构
随着对计算机系统的网络攻击的增加和移动系统使用的迅速增加,确保这些移动设备的安全至关重要。鉴于这些系统可以在多个网络上漫游,而在每个网络上采用的安全性没有保证,包括移动平台上的入侵检测系统(IDS)可以有助于防止网络攻击。在移动平台上实现IDS的一个关键问题是不断增加的功耗。本文介绍了在Snort IDS中实现字符串匹配任务的低功耗电路。这些任务最多可以占用Snort所消耗的80%的功率。所提出的电路基于忆阻交叉棒,并在每个签名0.013mW时评估Snort规则。该电路易于编程,仅使用两种忆阻器的电阻状态。它们是高度并行和密集的,利用暴力字符串匹配算法。这些电路还可以用于其他字符串匹配操作。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信