Intrusion Detection Architecture Utilizing Graphics Processors

With the thriving technology and the great increase in the usage of computer networks, the risk of having these network to be under attacks have been increased. Number of techniques have been created and designed to help in detecting and/or preventing such attacks. One common technique is the use of...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Acta Informatica Pragensia 2012-12, Vol.1 (1), p.50-59
Hauptverfasser: Vokorokos, Liberios, Baláž, Anton, Madoš, Branislav
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 59
container_issue 1
container_start_page 50
container_title Acta Informatica Pragensia
container_volume 1
creator Vokorokos, Liberios
Baláž, Anton
Madoš, Branislav
description With the thriving technology and the great increase in the usage of computer networks, the risk of having these network to be under attacks have been increased. Number of techniques have been created and designed to help in detecting and/or preventing such attacks. One common technique is the use of Intrusion Detection Systems (IDS). Today, number of open sources and commercial IDS are available to match enterprises requirements. However, the performance of these systems is still the main concern. This paper examines perceptions of intrusion detection architecture implementation, resulting from the use of graphics processor. It discusses recent research activities, developments and problems of operating systems security. Some exploratory evidence is presented that shows capabilities of using graphical processors and intrusion detection systems. The focus is on how knowledge experienced throughout the graphics processor inclusion has played out in the design of intrusion detection architecture that is seen as an opportunity to strengthen research expertise.
doi_str_mv 10.18267/j.aip.5
format Article
fullrecord <record><control><sourceid>ceeol_cross</sourceid><recordid>TN_cdi_ceeol_journals_662937</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ceeol_id>662937</ceeol_id><doaj_id>oai_doaj_org_article_451c4e69400b40d4b5c81efd702b511b</doaj_id><sourcerecordid>662937</sourcerecordid><originalsourceid>FETCH-LOGICAL-c1935-baeafcddb16f857c53b4a4d1556a720cb0ad97a993658f7a3abadb2dc04fb3a43</originalsourceid><addsrcrecordid>eNpNkEtLAzEUhYMoWGrBH-Bilm6mJpPceWyEUm0tFHRh1-HmMW2GcVKS6UJ_vdMH4uqeezl83HMIuWd0ysosL56aKbr9FK7IiJUUUlEBu_6nb8kkxoZSyjKAHGBEnlddHw7R-S55sb3V_VHNgt6543IINtn0rnU_rtsmy4D7ndMx-Qhe2xh9iHfkpsY22slljslm8fo5f0vX78vVfLZONas4pAot1toYxfK6hEIDVwKFYcMTWGRUK4qmKrCqeA5lXSBHhUZlRlNRK46Cj8nqzDUeG7kP7gvDt_To5Ongw1Zi6J1urRTAtLB5JShVghqhQJfM1qagmQLG1MB6PLN08DEGW__xGJWnGmUjhxolDNaHi9Va38rGH0I3xJR5nlW84L9Ea3AX</addsrcrecordid><sourcetype>Open Website</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Intrusion Detection Architecture Utilizing Graphics Processors</title><source>DOAJ Directory of Open Access Journals</source><source>EZB-FREE-00999 freely available EZB journals</source><creator>Vokorokos, Liberios ; Baláž, Anton ; Madoš, Branislav</creator><creatorcontrib>Vokorokos, Liberios ; Baláž, Anton ; Madoš, Branislav</creatorcontrib><description>With the thriving technology and the great increase in the usage of computer networks, the risk of having these network to be under attacks have been increased. Number of techniques have been created and designed to help in detecting and/or preventing such attacks. One common technique is the use of Intrusion Detection Systems (IDS). Today, number of open sources and commercial IDS are available to match enterprises requirements. However, the performance of these systems is still the main concern. This paper examines perceptions of intrusion detection architecture implementation, resulting from the use of graphics processor. It discusses recent research activities, developments and problems of operating systems security. Some exploratory evidence is presented that shows capabilities of using graphical processors and intrusion detection systems. The focus is on how knowledge experienced throughout the graphics processor inclusion has played out in the design of intrusion detection architecture that is seen as an opportunity to strengthen research expertise.</description><identifier>ISSN: 1805-4951</identifier><identifier>EISSN: 1805-4951</identifier><identifier>DOI: 10.18267/j.aip.5</identifier><language>eng</language><publisher>Vysoká škola ekonomická v Praze</publisher><subject>Attacks ; GPU ; ICT Information and Communications Technologies ; Intrusion Detection Systems (IDS) ; Suricata ; Traffic</subject><ispartof>Acta Informatica Pragensia, 2012-12, Vol.1 (1), p.50-59</ispartof><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c1935-baeafcddb16f857c53b4a4d1556a720cb0ad97a993658f7a3abadb2dc04fb3a43</citedby><cites>FETCH-LOGICAL-c1935-baeafcddb16f857c53b4a4d1556a720cb0ad97a993658f7a3abadb2dc04fb3a43</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Uhttps://www.ceeol.com//api/image/getissuecoverimage?id=picture_2012_39813.png</thumbnail><link.rule.ids>314,780,784,864,2102,27924,27925</link.rule.ids></links><search><creatorcontrib>Vokorokos, Liberios</creatorcontrib><creatorcontrib>Baláž, Anton</creatorcontrib><creatorcontrib>Madoš, Branislav</creatorcontrib><title>Intrusion Detection Architecture Utilizing Graphics Processors</title><title>Acta Informatica Pragensia</title><addtitle>Acta Informatica Pragensia</addtitle><description>With the thriving technology and the great increase in the usage of computer networks, the risk of having these network to be under attacks have been increased. Number of techniques have been created and designed to help in detecting and/or preventing such attacks. One common technique is the use of Intrusion Detection Systems (IDS). Today, number of open sources and commercial IDS are available to match enterprises requirements. However, the performance of these systems is still the main concern. This paper examines perceptions of intrusion detection architecture implementation, resulting from the use of graphics processor. It discusses recent research activities, developments and problems of operating systems security. Some exploratory evidence is presented that shows capabilities of using graphical processors and intrusion detection systems. The focus is on how knowledge experienced throughout the graphics processor inclusion has played out in the design of intrusion detection architecture that is seen as an opportunity to strengthen research expertise.</description><subject>Attacks</subject><subject>GPU</subject><subject>ICT Information and Communications Technologies</subject><subject>Intrusion Detection Systems (IDS)</subject><subject>Suricata</subject><subject>Traffic</subject><issn>1805-4951</issn><issn>1805-4951</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2012</creationdate><recordtype>article</recordtype><sourceid>REL</sourceid><sourceid>DOA</sourceid><recordid>eNpNkEtLAzEUhYMoWGrBH-Bilm6mJpPceWyEUm0tFHRh1-HmMW2GcVKS6UJ_vdMH4uqeezl83HMIuWd0ysosL56aKbr9FK7IiJUUUlEBu_6nb8kkxoZSyjKAHGBEnlddHw7R-S55sb3V_VHNgt6543IINtn0rnU_rtsmy4D7ndMx-Qhe2xh9iHfkpsY22slljslm8fo5f0vX78vVfLZONas4pAot1toYxfK6hEIDVwKFYcMTWGRUK4qmKrCqeA5lXSBHhUZlRlNRK46Cj8nqzDUeG7kP7gvDt_To5Ongw1Zi6J1urRTAtLB5JShVghqhQJfM1qagmQLG1MB6PLN08DEGW__xGJWnGmUjhxolDNaHi9Va38rGH0I3xJR5nlW84L9Ea3AX</recordid><startdate>20121229</startdate><enddate>20121229</enddate><creator>Vokorokos, Liberios</creator><creator>Baláž, Anton</creator><creator>Madoš, Branislav</creator><general>Vysoká škola ekonomická v Praze</general><general>Prague University of Economics and Business</general><scope>AE2</scope><scope>BIXPP</scope><scope>REL</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>DOA</scope></search><sort><creationdate>20121229</creationdate><title>Intrusion Detection Architecture Utilizing Graphics Processors</title><author>Vokorokos, Liberios ; Baláž, Anton ; Madoš, Branislav</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c1935-baeafcddb16f857c53b4a4d1556a720cb0ad97a993658f7a3abadb2dc04fb3a43</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2012</creationdate><topic>Attacks</topic><topic>GPU</topic><topic>ICT Information and Communications Technologies</topic><topic>Intrusion Detection Systems (IDS)</topic><topic>Suricata</topic><topic>Traffic</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Vokorokos, Liberios</creatorcontrib><creatorcontrib>Baláž, Anton</creatorcontrib><creatorcontrib>Madoš, Branislav</creatorcontrib><collection>Central and Eastern European Online Library (C.E.E.O.L.) (DFG Nationallizenzen)</collection><collection>CEEOL: Open Access</collection><collection>Central and Eastern European Online Library - CEEOL Journals</collection><collection>CrossRef</collection><collection>DOAJ Directory of Open Access Journals</collection><jtitle>Acta Informatica Pragensia</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Vokorokos, Liberios</au><au>Baláž, Anton</au><au>Madoš, Branislav</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Intrusion Detection Architecture Utilizing Graphics Processors</atitle><jtitle>Acta Informatica Pragensia</jtitle><addtitle>Acta Informatica Pragensia</addtitle><date>2012-12-29</date><risdate>2012</risdate><volume>1</volume><issue>1</issue><spage>50</spage><epage>59</epage><pages>50-59</pages><issn>1805-4951</issn><eissn>1805-4951</eissn><abstract>With the thriving technology and the great increase in the usage of computer networks, the risk of having these network to be under attacks have been increased. Number of techniques have been created and designed to help in detecting and/or preventing such attacks. One common technique is the use of Intrusion Detection Systems (IDS). Today, number of open sources and commercial IDS are available to match enterprises requirements. However, the performance of these systems is still the main concern. This paper examines perceptions of intrusion detection architecture implementation, resulting from the use of graphics processor. It discusses recent research activities, developments and problems of operating systems security. Some exploratory evidence is presented that shows capabilities of using graphical processors and intrusion detection systems. The focus is on how knowledge experienced throughout the graphics processor inclusion has played out in the design of intrusion detection architecture that is seen as an opportunity to strengthen research expertise.</abstract><pub>Vysoká škola ekonomická v Praze</pub><doi>10.18267/j.aip.5</doi><tpages>10</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 1805-4951
ispartof Acta Informatica Pragensia, 2012-12, Vol.1 (1), p.50-59
issn 1805-4951
1805-4951
language eng
recordid cdi_ceeol_journals_662937
source DOAJ Directory of Open Access Journals; EZB-FREE-00999 freely available EZB journals
subjects Attacks
GPU
ICT Information and Communications Technologies
Intrusion Detection Systems (IDS)
Suricata
Traffic
title Intrusion Detection Architecture Utilizing Graphics Processors
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-01T22%3A24%3A42IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ceeol_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Intrusion%20Detection%20Architecture%20Utilizing%20Graphics%20Processors&rft.jtitle=Acta%20Informatica%20Pragensia&rft.au=Vokorokos,%20Liberios&rft.date=2012-12-29&rft.volume=1&rft.issue=1&rft.spage=50&rft.epage=59&rft.pages=50-59&rft.issn=1805-4951&rft.eissn=1805-4951&rft_id=info:doi/10.18267/j.aip.5&rft_dat=%3Cceeol_cross%3E662937%3C/ceeol_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ceeol_id=662937&rft_doaj_id=oai_doaj_org_article_451c4e69400b40d4b5c81efd702b511b&rfr_iscdi=true