2016
DOI: 10.1109/tetc.2014.2369958
|View full text |Cite
|
Sign up to set email alerts
|

LEoNIDS: A Low-Latency and Energy-Efficient Network-Level Intrusion Detection System

Abstract: This publication reflects the views only of the authors, and the Commission cannot be held responsible for any use which may be made of the information contained therein.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
2
2
2

Relationship

0
6

Authors

Journals

citations
Cited by 33 publications
(14 citation statements)
references
References 22 publications
(20 reference statements)
0
13
0
Order By: Relevance
“…Compared with the simple methods of cloud computing, analyzing data on edge nodes and making critical time‐sensitive decisions on the local network make the system more robust and predictable. Moreover, the processed data can be transmitted to the cloud for storage and further analysis, which also minimizes the flow between cloud layers …”
Section: Design and Implementation Of The Sewmsmentioning
confidence: 99%
See 1 more Smart Citation
“…Compared with the simple methods of cloud computing, analyzing data on edge nodes and making critical time‐sensitive decisions on the local network make the system more robust and predictable. Moreover, the processed data can be transmitted to the cloud for storage and further analysis, which also minimizes the flow between cloud layers …”
Section: Design and Implementation Of The Sewmsmentioning
confidence: 99%
“…Moreover, the processed data can be transmitted to the cloud for storage and further analysis, which also minimizes the flow between cloud layers. 25…”
Section: Low Latencymentioning
confidence: 99%
“…Another NLIDS named LEoNIDS is presented in the work of Tsikoudis et al The authors try to solve energy‐latency trade‐off by achieving low latency and power efficiency at the same time. Instead of focusing on reduction in computational complexity of the IDS that would result in energy efficiency and low latency, a popular IDS, ie, Snort, is used and modern features of multicore microprocessor platforms are exploited.…”
Section: Related Workmentioning
confidence: 99%
“…Computational grid is used because IIDPS is computationally hungry. Unlike the work of Tsikoudis et al, asymptotic analysis is provided for IIDPS. Computational complexities of mining server and detection server are O ( n 6 ) and Ofalse(sans-serifgn5false), respectively, where sans-serifg is number of legal users.…”
Section: Related Workmentioning
confidence: 99%
“…Detection latency is defined to be the time passed from the arrival of the last packet that contains the attack until the alert generation in the network Interrupt handling time is negligible compared to the queuing delay and network intrusion detection system (NIDS) processing time [90]. Therefore incoming packets will experience a finite delay and will be placed in a queue before being served by the processing node.…”
Section: Intrusion Detection Latencymentioning
confidence: 99%