About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
sis 14(3): e3

Research Article

High-performance Architecture of Network Intrusion Prevention Systems

Download1487 downloads
Cite
BibTeX Plain Text
  • @ARTICLE{10.4108/sis.1.3.e3,
        author={Zhao Yueai and Hou Pengcheng and Wang Ling and Han Suqing},
        title={High-performance Architecture of Network Intrusion Prevention Systems},
        journal={EAI Endorsed Transactions on Scalable Information Systems},
        volume={1},
        number={3},
        publisher={ICST},
        journal_a={SIS},
        year={2014},
        month={5},
        keywords={Network Intrusion Prevention, Network Processor, heterogeneous multi-core processing architecture, anomaly detection.},
        doi={10.4108/sis.1.3.e3}
    }
    
  • Zhao Yueai
    Hou Pengcheng
    Wang Ling
    Han Suqing
    Year: 2014
    High-performance Architecture of Network Intrusion Prevention Systems
    SIS
    ICST
    DOI: 10.4108/sis.1.3.e3
Zhao Yueai1,*, Hou Pengcheng1, Wang Ling2, Han Suqing1
  • 1: Department of Computer Science, Taiyuan Normal University, Taiyuan, P. R. China
  • 2: Department of Computer Science, Engineering College of Shanxi University
*Contact email: tysyzya@sina.com

Abstract

Software-based Network Intrusion Prevention Systems have difficulty in handling high speed links. Network processor (NP) is an emerging field of programmable processors that are optimized to implement network data. In this paper, a novel Network Intrusion Prevention scheme is designed based on a heterogeneous multi-core processing architecture where its NP devices complement genera purpose multi-core processors to improve the performance of packet processing. We use Netronome’s network processor to process network traffic at the data link (Ethernet), network (IP), and transport/control layers. A set of network-based anomaly Intrusion Detection sensors is used in processing network traffic. Experimental results show our enhancements can reduce the processing load of the Intrusion Detection sensors. The load balancing by the protocol is better then other previous work.

Keywords
Network Intrusion Prevention, Network Processor, heterogeneous multi-core processing architecture, anomaly detection.
Received
2014-03-21
Accepted
2014-04-24
Published
2014-05-27
Publisher
ICST
http://dx.doi.org/10.4108/sis.1.3.e3

Copyright © 2014 Zhao Yueai1 et al., licensed to ICST. This is an open access article distributed under the terms of the Creative Commons Attribution licence (http://creativecommons.org/licenses/by/3.0/), which permits unlimited use, distribution and reproduction in any medium so long as the original work is properly cited.

EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL