Intrusion Detection Architecture Utilizing Graphics Processors
With the thriving technology and the great increase in the usage of computer networks, the risk of having these network to be under attacks have been increased. Number of techniques have been created and designed to help in detecting and/or preventing such attacks. One common technique is the use of...
Gespeichert in:
Veröffentlicht in: | Acta Informatica Pragensia 2012-12, Vol.1 (1), p.50-59 |
---|---|
Hauptverfasser: | , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 59 |
---|---|
container_issue | 1 |
container_start_page | 50 |
container_title | Acta Informatica Pragensia |
container_volume | 1 |
creator | Vokorokos, Liberios Baláž, Anton Madoš, Branislav |
description | With the thriving technology and the great increase in the usage of computer networks, the risk of having these network to be under attacks have been increased. Number of techniques have been created and designed to help in detecting and/or preventing such attacks. One common technique is the use of Intrusion Detection Systems (IDS). Today, number of open sources and commercial IDS are available to match enterprises requirements. However, the performance of these systems is still the main concern. This paper examines perceptions of intrusion detection architecture implementation, resulting from the use of graphics processor. It discusses recent research activities, developments and problems of operating systems security. Some exploratory evidence is presented that shows capabilities of using graphical processors and intrusion detection systems. The focus is on how knowledge experienced throughout the graphics processor inclusion has played out in the design of intrusion detection architecture that is seen as an opportunity to strengthen research expertise. |
doi_str_mv | 10.18267/j.aip.5 |
format | Article |
fullrecord | <record><control><sourceid>ceeol_cross</sourceid><recordid>TN_cdi_ceeol_journals_662937</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ceeol_id>662937</ceeol_id><doaj_id>oai_doaj_org_article_451c4e69400b40d4b5c81efd702b511b</doaj_id><sourcerecordid>662937</sourcerecordid><originalsourceid>FETCH-LOGICAL-c1935-baeafcddb16f857c53b4a4d1556a720cb0ad97a993658f7a3abadb2dc04fb3a43</originalsourceid><addsrcrecordid>eNpNkEtLAzEUhYMoWGrBH-Bilm6mJpPceWyEUm0tFHRh1-HmMW2GcVKS6UJ_vdMH4uqeezl83HMIuWd0ysosL56aKbr9FK7IiJUUUlEBu_6nb8kkxoZSyjKAHGBEnlddHw7R-S55sb3V_VHNgt6543IINtn0rnU_rtsmy4D7ndMx-Qhe2xh9iHfkpsY22slljslm8fo5f0vX78vVfLZONas4pAot1toYxfK6hEIDVwKFYcMTWGRUK4qmKrCqeA5lXSBHhUZlRlNRK46Cj8nqzDUeG7kP7gvDt_To5Ongw1Zi6J1urRTAtLB5JShVghqhQJfM1qagmQLG1MB6PLN08DEGW__xGJWnGmUjhxolDNaHi9Va38rGH0I3xJR5nlW84L9Ea3AX</addsrcrecordid><sourcetype>Open Website</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Intrusion Detection Architecture Utilizing Graphics Processors</title><source>DOAJ Directory of Open Access Journals</source><source>EZB-FREE-00999 freely available EZB journals</source><creator>Vokorokos, Liberios ; Baláž, Anton ; Madoš, Branislav</creator><creatorcontrib>Vokorokos, Liberios ; Baláž, Anton ; Madoš, Branislav</creatorcontrib><description>With the thriving technology and the great increase in the usage of computer networks, the risk of having these network to be under attacks have been increased. Number of techniques have been created and designed to help in detecting and/or preventing such attacks. One common technique is the use of Intrusion Detection Systems (IDS). Today, number of open sources and commercial IDS are available to match enterprises requirements. However, the performance of these systems is still the main concern. This paper examines perceptions of intrusion detection architecture implementation, resulting from the use of graphics processor. It discusses recent research activities, developments and problems of operating systems security. Some exploratory evidence is presented that shows capabilities of using graphical processors and intrusion detection systems. The focus is on how knowledge experienced throughout the graphics processor inclusion has played out in the design of intrusion detection architecture that is seen as an opportunity to strengthen research expertise.</description><identifier>ISSN: 1805-4951</identifier><identifier>EISSN: 1805-4951</identifier><identifier>DOI: 10.18267/j.aip.5</identifier><language>eng</language><publisher>Vysoká škola ekonomická v Praze</publisher><subject>Attacks ; GPU ; ICT Information and Communications Technologies ; Intrusion Detection Systems (IDS) ; Suricata ; Traffic</subject><ispartof>Acta Informatica Pragensia, 2012-12, Vol.1 (1), p.50-59</ispartof><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c1935-baeafcddb16f857c53b4a4d1556a720cb0ad97a993658f7a3abadb2dc04fb3a43</citedby><cites>FETCH-LOGICAL-c1935-baeafcddb16f857c53b4a4d1556a720cb0ad97a993658f7a3abadb2dc04fb3a43</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Uhttps://www.ceeol.com//api/image/getissuecoverimage?id=picture_2012_39813.png</thumbnail><link.rule.ids>314,780,784,864,2102,27924,27925</link.rule.ids></links><search><creatorcontrib>Vokorokos, Liberios</creatorcontrib><creatorcontrib>Baláž, Anton</creatorcontrib><creatorcontrib>Madoš, Branislav</creatorcontrib><title>Intrusion Detection Architecture Utilizing Graphics Processors</title><title>Acta Informatica Pragensia</title><addtitle>Acta Informatica Pragensia</addtitle><description>With the thriving technology and the great increase in the usage of computer networks, the risk of having these network to be under attacks have been increased. Number of techniques have been created and designed to help in detecting and/or preventing such attacks. One common technique is the use of Intrusion Detection Systems (IDS). Today, number of open sources and commercial IDS are available to match enterprises requirements. However, the performance of these systems is still the main concern. This paper examines perceptions of intrusion detection architecture implementation, resulting from the use of graphics processor. It discusses recent research activities, developments and problems of operating systems security. Some exploratory evidence is presented that shows capabilities of using graphical processors and intrusion detection systems. The focus is on how knowledge experienced throughout the graphics processor inclusion has played out in the design of intrusion detection architecture that is seen as an opportunity to strengthen research expertise.</description><subject>Attacks</subject><subject>GPU</subject><subject>ICT Information and Communications Technologies</subject><subject>Intrusion Detection Systems (IDS)</subject><subject>Suricata</subject><subject>Traffic</subject><issn>1805-4951</issn><issn>1805-4951</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2012</creationdate><recordtype>article</recordtype><sourceid>REL</sourceid><sourceid>DOA</sourceid><recordid>eNpNkEtLAzEUhYMoWGrBH-Bilm6mJpPceWyEUm0tFHRh1-HmMW2GcVKS6UJ_vdMH4uqeezl83HMIuWd0ysosL56aKbr9FK7IiJUUUlEBu_6nb8kkxoZSyjKAHGBEnlddHw7R-S55sb3V_VHNgt6543IINtn0rnU_rtsmy4D7ndMx-Qhe2xh9iHfkpsY22slljslm8fo5f0vX78vVfLZONas4pAot1toYxfK6hEIDVwKFYcMTWGRUK4qmKrCqeA5lXSBHhUZlRlNRK46Cj8nqzDUeG7kP7gvDt_To5Ongw1Zi6J1urRTAtLB5JShVghqhQJfM1qagmQLG1MB6PLN08DEGW__xGJWnGmUjhxolDNaHi9Va38rGH0I3xJR5nlW84L9Ea3AX</recordid><startdate>20121229</startdate><enddate>20121229</enddate><creator>Vokorokos, Liberios</creator><creator>Baláž, Anton</creator><creator>Madoš, Branislav</creator><general>Vysoká škola ekonomická v Praze</general><general>Prague University of Economics and Business</general><scope>AE2</scope><scope>BIXPP</scope><scope>REL</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>DOA</scope></search><sort><creationdate>20121229</creationdate><title>Intrusion Detection Architecture Utilizing Graphics Processors</title><author>Vokorokos, Liberios ; Baláž, Anton ; Madoš, Branislav</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c1935-baeafcddb16f857c53b4a4d1556a720cb0ad97a993658f7a3abadb2dc04fb3a43</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2012</creationdate><topic>Attacks</topic><topic>GPU</topic><topic>ICT Information and Communications Technologies</topic><topic>Intrusion Detection Systems (IDS)</topic><topic>Suricata</topic><topic>Traffic</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Vokorokos, Liberios</creatorcontrib><creatorcontrib>Baláž, Anton</creatorcontrib><creatorcontrib>Madoš, Branislav</creatorcontrib><collection>Central and Eastern European Online Library (C.E.E.O.L.) (DFG Nationallizenzen)</collection><collection>CEEOL: Open Access</collection><collection>Central and Eastern European Online Library - CEEOL Journals</collection><collection>CrossRef</collection><collection>DOAJ Directory of Open Access Journals</collection><jtitle>Acta Informatica Pragensia</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Vokorokos, Liberios</au><au>Baláž, Anton</au><au>Madoš, Branislav</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Intrusion Detection Architecture Utilizing Graphics Processors</atitle><jtitle>Acta Informatica Pragensia</jtitle><addtitle>Acta Informatica Pragensia</addtitle><date>2012-12-29</date><risdate>2012</risdate><volume>1</volume><issue>1</issue><spage>50</spage><epage>59</epage><pages>50-59</pages><issn>1805-4951</issn><eissn>1805-4951</eissn><abstract>With the thriving technology and the great increase in the usage of computer networks, the risk of having these network to be under attacks have been increased. Number of techniques have been created and designed to help in detecting and/or preventing such attacks. One common technique is the use of Intrusion Detection Systems (IDS). Today, number of open sources and commercial IDS are available to match enterprises requirements. However, the performance of these systems is still the main concern. This paper examines perceptions of intrusion detection architecture implementation, resulting from the use of graphics processor. It discusses recent research activities, developments and problems of operating systems security. Some exploratory evidence is presented that shows capabilities of using graphical processors and intrusion detection systems. The focus is on how knowledge experienced throughout the graphics processor inclusion has played out in the design of intrusion detection architecture that is seen as an opportunity to strengthen research expertise.</abstract><pub>Vysoká škola ekonomická v Praze</pub><doi>10.18267/j.aip.5</doi><tpages>10</tpages><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1805-4951 |
ispartof | Acta Informatica Pragensia, 2012-12, Vol.1 (1), p.50-59 |
issn | 1805-4951 1805-4951 |
language | eng |
recordid | cdi_ceeol_journals_662937 |
source | DOAJ Directory of Open Access Journals; EZB-FREE-00999 freely available EZB journals |
subjects | Attacks GPU ICT Information and Communications Technologies Intrusion Detection Systems (IDS) Suricata Traffic |
title | Intrusion Detection Architecture Utilizing Graphics Processors |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-01T22%3A24%3A42IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ceeol_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Intrusion%20Detection%20Architecture%20Utilizing%20Graphics%20Processors&rft.jtitle=Acta%20Informatica%20Pragensia&rft.au=Vokorokos,%20Liberios&rft.date=2012-12-29&rft.volume=1&rft.issue=1&rft.spage=50&rft.epage=59&rft.pages=50-59&rft.issn=1805-4951&rft.eissn=1805-4951&rft_id=info:doi/10.18267/j.aip.5&rft_dat=%3Cceeol_cross%3E662937%3C/ceeol_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ceeol_id=662937&rft_doaj_id=oai_doaj_org_article_451c4e69400b40d4b5c81efd702b511b&rfr_iscdi=true |