Title | ||
---|---|---|
Using Hash Table To Extract Real-Time Online Network Traffic Features For Hardware Ids |
Abstract | ||
---|---|---|
This work introduces an efficient algorithm for extracting set of features from raw network traffic. Network traffic is captured directly from a Network Interface Card (NIC). The proposed algorithm is used to build an efficient real-time Network Based Intrusion Detection/Prevention Systems (NBIDPS). NBIDPS rely on network traffic as their primary data source, so there is a great need for a reliable, fast algorithm to extract required features for hardware intrusion detection system from available network traffic. It minimizes search time for extracting statistical features from connection records stored in connection queues to memory references. NBIDPS need to implement this algorithm in a high bit rate network such as a gigabit network, ten gigabit or higher. |
Year | DOI | Venue |
---|---|---|
2012 | 10.1080/19393555.2011.642062 | INFORMATION SECURITY JOURNAL |
Keywords | Field | DocType |
Intrusion Detection System, hardware IDS, feature extraction, hash table | Host-based intrusion detection system,Computer security,Computer science,Network architecture,Computer network,Real-time computing,Computer hardware,Intrusion detection system,Traffic generation model,Gigabit,Network forensics,Network interface controller,Network traffic control | Journal |
Volume | Issue | ISSN |
21 | 1 | 1939-3555 |
Citations | PageRank | References |
0 | 0.34 | 13 |
Authors | ||
3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Mohamed Ibrahiem Amer | 1 | 1 | 0.71 |
Tarek Sobh | 2 | 109 | 17.84 |
Gouda Ismail Mohamed | 3 | 0 | 0.34 |