Articles liés à Architecture Support for Intrusion Detection systems:...

Architecture Support for Intrusion Detection systems: Hardware and Software techniques to improve the performance and area efficiency of an IDS - Couverture souple

 
9783659612770: Architecture Support for Intrusion Detection systems: Hardware and Software techniques to improve the performance and area efficiency of an IDS

Synopsis

System security is a prerequisite for efficient day-to-day transactions. As a consequence, Intrusion Detection Systems (IDS) are commonly used to provide an effective security ring to systems in a network. An IDS operates by inspecting packets flowing in the network for malicious content. To do so, an IDS like Snort[49] compares bytes in a packet with a database of prior reported attacks. This functionality can also be viewed as string matching of the packet bytes with the attack string database. In this thesis we explore hardware and software techniques to accelerate string matching in an IDS. We propose mechanisms/hueristics that can be deployed either in a custom ASIC or a network processor and/or a commodity CPU. Our performance results indicate clear benefits in using our proposed scheme over the state-of-the-art.

Les informations fournies dans la section « Synopsis » peuvent faire référence à une autre édition de ce titre.

Acheter D'occasion

état :  Comme neuf
Like New
Afficher cet article
EUR 109,47

Autre devise

EUR 28,88 expédition depuis Royaume-Uni vers France

Destinations, frais et délais

Acheter neuf

Afficher cet article
EUR 43,20

Autre devise

EUR 9,70 expédition depuis Allemagne vers France

Destinations, frais et délais

Résultats de recherche pour Architecture Support for Intrusion Detection systems:...

Image fournie par le vendeur

Govind Sreekar Shenoy
ISBN 10 : 3659612774 ISBN 13 : 9783659612770
Neuf Couverture souple
impression à la demande

Vendeur : moluna, Greven, Allemagne

Évaluation du vendeur 5 sur 5 étoiles Evaluation 5 étoiles, En savoir plus sur les évaluations des vendeurs

Etat : New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Autor/Autorin: Sreekar Shenoy GovindGovind currently is a post-doctoral research fellow at the University of Edinburgh. Govind completed his Doctorate from Universitat Politecnica De Catalunya, Barcelona in 2012. He completed his Master of Science . N° de réf. du vendeur 5168330

Contacter le vendeur

Acheter neuf

EUR 43,20
Autre devise
Frais de port : EUR 9,70
De Allemagne vers France
Destinations, frais et délais

Quantité disponible : Plus de 20 disponibles

Ajouter au panier

Image fournie par le vendeur

Govind Sreekar Shenoy
ISBN 10 : 3659612774 ISBN 13 : 9783659612770
Neuf Taschenbuch
impression à la demande

Vendeur : AHA-BUCH GmbH, Einbeck, Allemagne

Évaluation du vendeur 5 sur 5 étoiles Evaluation 5 étoiles, En savoir plus sur les évaluations des vendeurs

Taschenbuch. Etat : Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - System security is a prerequisite for efficient day-to-day transactions. As a consequence, Intrusion Detection Systems (IDS) are commonly used to provide an effective security ring to systems in a network. An IDS operates by inspecting packets flowing in the network for malicious content. To do so, an IDS like Snort[49] compares bytes in a packet with a database of prior reported attacks. This functionality can also be viewed as string matching of the packet bytes with the attack string database. In this thesis we explore hardware and software techniques to accelerate string matching in an IDS. We propose mechanisms/hueristics that can be deployed either in a custom ASIC or a network processor and/or a commodity CPU. Our performance results indicate clear benefits in using our proposed scheme over the state-of-the-art. N° de réf. du vendeur 9783659612770

Contacter le vendeur

Acheter neuf

EUR 51,90
Autre devise
Frais de port : EUR 10,99
De Allemagne vers France
Destinations, frais et délais

Quantité disponible : 1 disponible(s)

Ajouter au panier

Image fournie par le vendeur

Govind Sreekar Shenoy
ISBN 10 : 3659612774 ISBN 13 : 9783659612770
Neuf Taschenbuch
impression à la demande

Vendeur : BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Allemagne

Évaluation du vendeur 5 sur 5 étoiles Evaluation 5 étoiles, En savoir plus sur les évaluations des vendeurs

Taschenbuch. Etat : Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -System security is a prerequisite for efficient day-to-day transactions. As a consequence, Intrusion Detection Systems (IDS) are commonly used to provide an effective security ring to systems in a network. An IDS operates by inspecting packets flowing in the network for malicious content. To do so, an IDS like Snort[49] compares bytes in a packet with a database of prior reported attacks. This functionality can also be viewed as string matching of the packet bytes with the attack string database. In this thesis we explore hardware and software techniques to accelerate string matching in an IDS. We propose mechanisms/hueristics that can be deployed either in a custom ASIC or a network processor and/or a commodity CPU. Our performance results indicate clear benefits in using our proposed scheme over the state-of-the-art. 160 pp. Englisch. N° de réf. du vendeur 9783659612770

Contacter le vendeur

Acheter neuf

EUR 51,90
Autre devise
Frais de port : EUR 11
De Allemagne vers France
Destinations, frais et délais

Quantité disponible : 2 disponible(s)

Ajouter au panier

Image fournie par le vendeur

Govind Sreekar Shenoy
ISBN 10 : 3659612774 ISBN 13 : 9783659612770
Neuf Taschenbuch

Vendeur : buchversandmimpf2000, Emtmannsberg, BAYE, Allemagne

Évaluation du vendeur 5 sur 5 étoiles Evaluation 5 étoiles, En savoir plus sur les évaluations des vendeurs

Taschenbuch. Etat : Neu. Neuware -System security is a prerequisite for efficient day-to-day transactions. As a consequence, Intrusion Detection Systems (IDS) are commonly used to provide an effective security ring to systems in a network. An IDS operates by inspecting packets flowing in the network for malicious content. To do so, an IDS like Snort[49] compares bytes in a packet with a database of prior reported attacks. This functionality can also be viewed as string matching of the packet bytes with the attack string database. In this thesis we explore hardware and software techniques to accelerate string matching in an IDS. We propose mechanisms/hueristics that can be deployed either in a custom ASIC or a network processor and/or a commodity CPU. Our performance results indicate clear benefits in using our proposed scheme over the state-of-the-art.Books on Demand GmbH, Überseering 33, 22297 Hamburg 160 pp. Englisch. N° de réf. du vendeur 9783659612770

Contacter le vendeur

Acheter neuf

EUR 51,90
Autre devise
Frais de port : EUR 15
De Allemagne vers France
Destinations, frais et délais

Quantité disponible : 2 disponible(s)

Ajouter au panier

Image d'archives

Sreekar Shenoy, Govind
ISBN 10 : 3659612774 ISBN 13 : 9783659612770
Ancien ou d'occasion Paperback

Vendeur : Mispah books, Redhill, SURRE, Royaume-Uni

Évaluation du vendeur 4 sur 5 étoiles Evaluation 4 étoiles, En savoir plus sur les évaluations des vendeurs

Paperback. Etat : Like New. Like New. book. N° de réf. du vendeur ERICA75836596127745

Contacter le vendeur

Acheter D'occasion

EUR 109,47
Autre devise
Frais de port : EUR 28,88
De Royaume-Uni vers France
Destinations, frais et délais

Quantité disponible : 1 disponible(s)

Ajouter au panier