ETRI-Knowledge Sharing Plaform

KOREAN
논문 검색
Type SCI
Year ~ Keyword

Detail

Conference Paper Computational Science and Its Applications - ICCSA 2006
Cited - time in scopus Share share facebook twitter linkedin kakaostory
Authors
Dong Ho Kang, Byoung Koo Kim, Jin Tae Oh
Issue Date
2006-05
Citation
International Conference on Computational Science and Its Applications (ICCSA) 2006 (LNCS 3980), v.3980, pp.1-10
Publisher
Springer
Language
English
Type
Conference Paper
DOI
https://dx.doi.org/10.1007/11751540
Abstract
Network intrusion detection systems often rely on matching patterns that are gleaned from known attacks. While this method is reliable and rarely produces false alarms, it has the obvious disadvantage that it cannot detect novel attacks. Accordingly, an alternative approach which can be a combination with pattern matching approach is needed. We have made effort to design and implement high-speed protocol anomaly and signature-based intrusion detection approach to detect known and unknown attacks. This approach extracts a set of service fields from the application payload where many attacks occur and analyzes the value of fields to verify attack. This approach is implemented on the FPGA (Xilinx Virtex II pro) device to process packet at gigabit-per-second data rates.
KSP Keywords
False Alarm, Gigabit-Per-Second(Gbps), High Speed, Intrusion Detection Systems(IDSs), Intrusion detection system(IDS), Matching approach, Novel attacks, Signature-based, Xilinx virtex, computational science, data rate