2009 Fifth International Conference on Information Assurance and Security 2009
DOI: 10.1109/ias.2009.276
|View full text |Cite
|
Sign up to set email alerts
|

Evaluating Intrusion Detection Systems in High Speed Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
4
0

Year Published

2010
2010
2017
2017

Publication Types

Select...
2
2
2

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 3 publications
0
4
0
Order By: Relevance
“…A general NIDS without any hardware or software accelerations can just process packets at Kpps (packets per second) or Mbps (bits per second) [3][4][5]. In order to promote the processing speed, multicore-based string matching has been studied.…”
Section: Related Workmentioning
confidence: 99%
“…A general NIDS without any hardware or software accelerations can just process packets at Kpps (packets per second) or Mbps (bits per second) [3][4][5]. In order to promote the processing speed, multicore-based string matching has been studied.…”
Section: Related Workmentioning
confidence: 99%
“…Conventional software-programmable processors are sorely pressed to keep up with these speeds. A recent evaluation of the popular network intrusion detection system Snort showed that such a software system can scan only up to 200 Mb/s without noticeable packet loss on a standard CPU [1].…”
Section: Introductionmentioning
confidence: 99%
“…While employing the NIDS can detect and monitor network based threats without violating network policies, all packets in the entire network may not be completely analysed, and thus may cause a considerable delay in high-speed and heavy-load network environments [2,10,[18][19][20]. Therefore, it is vital that the NIDS should be able to deal with a large amount of traffic in a short time frame where all variations of network deployment, e.g., network speed, bandwidth, hardware resources, memory and processing power, need to be taken into account, and several nodes can be used in parallel and concurrently.…”
Section: Related Workmentioning
confidence: 99%
“…However, they also bring huge security challenges to deal with security breaches, loss of private and confidential data or service disruption, etc. in order to provide a perfect security mechanism for their clients or customers [1][2][3][4].…”
Section: Introductionmentioning
confidence: 99%