Items related to Architecture Support for Intrusion Detection systems:...

Architecture Support for Intrusion Detection systems: Hardware and Software techniques to improve the performance and area efficiency of an IDS - Softcover

 
9783659612770: Architecture Support for Intrusion Detection systems: Hardware and Software techniques to improve the performance and area efficiency of an IDS

Synopsis

System security is a prerequisite for efficient day-to-day transactions. As a consequence, Intrusion Detection Systems (IDS) are commonly used to provide an effective security ring to systems in a network. An IDS operates by inspecting packets flowing in the network for malicious content. To do so, an IDS like Snort[49] compares bytes in a packet with a database of prior reported attacks. This functionality can also be viewed as string matching of the packet bytes with the attack string database. In this thesis we explore hardware and software techniques to accelerate string matching in an IDS. We propose mechanisms/hueristics that can be deployed either in a custom ASIC or a network processor and/or a commodity CPU. Our performance results indicate clear benefits in using our proposed scheme over the state-of-the-art.

"synopsis" may belong to another edition of this title.

About the Author

Govind currently is a post-doctoral research fellow at the University of Edinburgh. Govind completed his Doctorate from Universitat Politecnica De Catalunya, Barcelona in 2012. He completed his Master of Science in Engineering from the Indian Institute of Science, Bangalore. He also completed his Bachelors from MNIT, Jaipur.

"About this title" may belong to another edition of this title.

  • PublisherLAP LAMBERT Academic Publishing
  • Publication date2014
  • ISBN 10 3659612774
  • ISBN 13 9783659612770
  • BindingPaperback
  • LanguageEnglish
  • Number of pages160

Buy Used

Condition: As New
Like New
View this item

£ 8 shipping within United Kingdom

Destination, rates & speeds

Buy New

View this item

£ 9.27 shipping from Germany to United Kingdom

Destination, rates & speeds

Search results for Architecture Support for Intrusion Detection systems:...

Seller Image

Govind Sreekar Shenoy
ISBN 10: 3659612774 ISBN 13: 9783659612770
New Taschenbuch
Print on Demand

Seller: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germany

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

Taschenbuch. Condition: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -System security is a prerequisite for efficient day-to-day transactions. As a consequence, Intrusion Detection Systems (IDS) are commonly used to provide an effective security ring to systems in a network. An IDS operates by inspecting packets flowing in the network for malicious content. To do so, an IDS like Snort[49] compares bytes in a packet with a database of prior reported attacks. This functionality can also be viewed as string matching of the packet bytes with the attack string database. In this thesis we explore hardware and software techniques to accelerate string matching in an IDS. We propose mechanisms/hueristics that can be deployed either in a custom ASIC or a network processor and/or a commodity CPU. Our performance results indicate clear benefits in using our proposed scheme over the state-of-the-art. 160 pp. Englisch. Seller Inventory # 9783659612770

Contact seller

Buy New

£ 45.05
Convert currency
Shipping: £ 9.27
From Germany to United Kingdom
Destination, rates & speeds

Quantity: 2 available

Add to basket

Seller Image

Govind Sreekar Shenoy
Published by LAP LAMBERT Academic Publishing, 2014
ISBN 10: 3659612774 ISBN 13: 9783659612770
New Taschenbuch
Print on Demand

Seller: AHA-BUCH GmbH, Einbeck, Germany

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

Taschenbuch. Condition: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - System security is a prerequisite for efficient day-to-day transactions. As a consequence, Intrusion Detection Systems (IDS) are commonly used to provide an effective security ring to systems in a network. An IDS operates by inspecting packets flowing in the network for malicious content. To do so, an IDS like Snort[49] compares bytes in a packet with a database of prior reported attacks. This functionality can also be viewed as string matching of the packet bytes with the attack string database. In this thesis we explore hardware and software techniques to accelerate string matching in an IDS. We propose mechanisms/hueristics that can be deployed either in a custom ASIC or a network processor and/or a commodity CPU. Our performance results indicate clear benefits in using our proposed scheme over the state-of-the-art. Seller Inventory # 9783659612770

Contact seller

Buy New

£ 45.05
Convert currency
Shipping: £ 11.79
From Germany to United Kingdom
Destination, rates & speeds

Quantity: 1 available

Add to basket

Seller Image

Govind Sreekar Shenoy
Published by LAP LAMBERT Academic Publishing, 2014
ISBN 10: 3659612774 ISBN 13: 9783659612770
New Softcover
Print on Demand

Seller: moluna, Greven, Germany

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

Condition: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Autor/Autorin: Sreekar Shenoy GovindGovind currently is a post-doctoral research fellow at the University of Edinburgh. Govind completed his Doctorate from Universitat Politecnica De Catalunya, Barcelona in 2012. He completed his Master of Science . Seller Inventory # 5168330

Contact seller

Buy New

£ 37.50
Convert currency
Shipping: £ 21.06
From Germany to United Kingdom
Destination, rates & speeds

Quantity: Over 20 available

Add to basket

Seller Image

Govind Sreekar Shenoy
ISBN 10: 3659612774 ISBN 13: 9783659612770
New Taschenbuch

Seller: buchversandmimpf2000, Emtmannsberg, BAYE, Germany

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

Taschenbuch. Condition: Neu. Neuware -System security is a prerequisite for efficient day-to-day transactions. As a consequence, Intrusion Detection Systems (IDS) are commonly used to provide an effective security ring to systems in a network. An IDS operates by inspecting packets flowing in the network for malicious content. To do so, an IDS like Snort[49] compares bytes in a packet with a database of prior reported attacks. This functionality can also be viewed as string matching of the packet bytes with the attack string database. In this thesis we explore hardware and software techniques to accelerate string matching in an IDS. We propose mechanisms/hueristics that can be deployed either in a custom ASIC or a network processor and/or a commodity CPU. Our performance results indicate clear benefits in using our proposed scheme over the state-of-the-art.Books on Demand GmbH, Überseering 33, 22297 Hamburg 160 pp. Englisch. Seller Inventory # 9783659612770

Contact seller

Buy New

£ 45.05
Convert currency
Shipping: £ 29.49
From Germany to United Kingdom
Destination, rates & speeds

Quantity: 2 available

Add to basket

Stock Image

Sreekar Shenoy, Govind
Published by LAP LAMBERT Academic Publishing, 2014
ISBN 10: 3659612774 ISBN 13: 9783659612770
Used Paperback

Seller: Mispah books, Redhill, SURRE, United Kingdom

Seller rating 4 out of 5 stars 4-star rating, Learn more about seller ratings

Paperback. Condition: Like New. Like New. book. Seller Inventory # ERICA75836596127745

Contact seller

Buy Used

£ 92
Convert currency
Shipping: £ 8
Within United Kingdom
Destination, rates & speeds

Quantity: 1 available

Add to basket