Intrusion detection system: A comprehensive review

HJ Liao, CHR Lin, YC Lin, KY Tung - Journal of Network and Computer …, 2013 - Elsevier
With the increasing amount of network throughput and security threat, the study of intrusion
detection systems (IDSs) has received a lot of attention throughout the computer science …

Gnort: High performance network intrusion detection using graphics processors

G Vasiliadis, S Antonatos, M Polychronakis… - Recent Advances in …, 2008 - Springer
The constant increase in link speeds and number of threats poses challenges to network
intrusion detection systems (NIDS), which must cope with higher traffic throughput and …

Evaluating GPUs for network packet signature matching

R Smith, N Goyal, J Ormont… - … Analysis of Systems …, 2009 - ieeexplore.ieee.org
Modern network devices employ deep packet inspection to enable sophisticated services
such as intrusion detection, traffic shaping, and load balancing. At the heart of such services …

[PDF][PDF] A performance analysis of snort and suricata network intrusion detection and prevention engines

D Day, B Burns - Fifth international conference on digital society …, 2011 - personales.upv.es
Recently, there has been shift to multi-core processors and consequently multithreaded
application design. Multithreaded Network Intrusion Detection and Prevention Systems …

Backtracking algorithmic complexity attacks against a NIDS

R Smith, C Estan, S Jha - 2006 22nd Annual Computer Security …, 2006 - ieeexplore.ieee.org
Network Intrusion Detection Systems (NIDS) have become crucial to securing modern
networks. To be effective, a NIDS must be able to counter evasion attempts and operate at or …

Privacy and security of big data in cyber physical systems using Weibull distribution-based intrusion detection

R Gifty, R Bharathi, P Krishnakumar - Neural Computing and Applications, 2019 - Springer
The volume of data collected from cyber physical systems (CPS) is huge, and we use big
data techniques to manage and store the data. Big data in CPS is concerned with the …

[HTML][HTML] Highly accurate and efficient two phase-intrusion detection system (TP-IDS) using distributed processing of HADOOP and machine learning techniques

AD Jadhav, V Pellakuri - Journal of Big Data, 2021 - Springer
Network security and data security are the biggest concerns now a days. Every organization
decides their future business process based on the past and day to day transactional data …

IP routing processing with graphic processors

S Mu, X Zhang, N Zhang, J Lu… - … Design, Automation & …, 2010 - ieeexplore.ieee.org
Throughput and programmability have always been the central, but generally conflicting
concerns for modern IP router designs. Current high performance routers depend on …

Scalable high-performance parallel design for network intrusion detection systems on many-core processors

H Jiang, G Zhang, G Xie, K Salamatian… - … for Networking and …, 2013 - ieeexplore.ieee.org
Network Intrusion Detection Systems (NIDSes) face significant challenges coming from the
relentless network link speed growth and increasing complexity of threats. Both hardware …

Internet technology adoption as an organizational event: an exploratory study across industries

RC King, ML Gribbins - Proceedings of the 35th Annual Hawaii …, 2002 - ieeexplore.ieee.org
In this exploratory study, Internet adoption decisions are examined from an organizational
perspective. We postulate that when the technology considered for adoption demands a shift …