ETRI-Knowledge Sharing Plaform

ENGLISH

성과물

논문 검색
구분 SCI
연도 ~ 키워드

상세정보

학술대회 ATPS - Adaptive Threat Prevention System for High-Performance Intrusion Detection and Response
Cited 0 time in scopus Download 0 time Share share facebook twitter linkedin kakaostory
저자
김병구, 윤승용, 오진태
발행일
200710
출처
Asia-Pacific Network Operations and Management Symposium (APNOMS) 2007 (LNCS 4773), v.4773, pp.344-353
DOI
https://dx.doi.org/10.1007/978-3-540-75476-3_35
협약과제
07MK1400, Network 위협의 Zero-Day Attack 대응을 위한 실시간 공격 Signature 생성 및 관리 기술개발, 장종수
초록
The fast extension of inexpensive computer networks has increased the problem of unauthorized access and tampering with data. Many NIDSs are developed till now to respond these network attacks. As network technology presses forward, Gigabit Ethernet has become the actual standard for large network installations. Therefore, software solutions in developing high-speed NIDSs are increasingly impractical. It thus appears well motivated to investigate the hardware-based solutions. Although several solutions have been proposed recently, finding an efficient solution is considered as a difficult problem due to the limitations in resources such as a small memory size, as well as the growing link speed. In this paper, we propose the FPAG-based intrusion detection technique to detect and respond variant attacks on high-speed links. It is possible through novel pattern matching mechanism and heuristic analysis mechanism that is processed on FPGA-based reconfiguring hardware. Most of all, It was designed to fully exploit hardware parallelism to achieve real-time packet inspection, to require a small memory for storing signature. The technique is a part of our proposed system, called ATPS(Adaptive Threat Prevention System) recently developed. That is, the proposed system has hardware architecture that can be capable of provide the high-performance detection mechanism. © Springer-Verlag Berlin Heidelberg 2007.
KSP 제안 키워드
Computer network, Efficient solution, Fast extension, Gigabit Ethernet, Hardware Architecture, Hardware parallelism, Heuristic analysis, High performance, Intrusion Detection Technique, Large network, Matching mechanism