Jump to ContentJump to Main Navigation
Show Summary Details
In This Section

Open Computer Science

Editor-in-Chief: van den Broek, Egon

1 Issue per year

Open Access
Online
ISSN
2299-1093
See all formats and pricing
In This Section

A Survey of parallel intrusion detection on graphical processors

Liberios Vokorokos
  • Dept. of Computers and Informatics, Technical University in Košice, Letná 9, Košice, 042 00, Slovakia
  • Email:
/ Michal Ennert
  • Dept. of Computers and Informatics, Technical University in Košice, Letná 9, Košice, 042 00, Slovakia
  • Email:
/ Marek >Čajkovský
  • Dept. of Computers and Informatics, Technical University in Košice, Letná 9, Košice, 042 00, Slovakia
  • Email:
/ Ján Radušovský
  • Dept. of Computers and Informatics, Technical University in Košice, Letná 9, Košice, 042 00, Slovakia
  • Email:
Published Online: 2014-10-08 | DOI: https://doi.org/10.2478/s13537-014-0213-6

Abstract

Intrusion detection is enormously developing field of informatics. This paper provides a survey of actual trends in intrusion detection in academic research. It presents a review about the evolution of intrusion detection systems with usage of general purpose computing on graphics processing units (GPGPU). There are many detection techniques but only some of them bring advantages of parallel computing implementation to graphical processors (GPU). The most common technique transformed into GPU is the technique of pattern matching. There is a number of intrusion detection tools using GPU tested in real network traffic.

Keywords: intrusion detection; GPGPU; parallel computing; high performance computing; survey

  • [1] R. Bace, Intrusion Detection, 2nd Edition (Macmillan Technical Publishing, Indiana, 2000) Google Scholar

  • [2] L. Vokorokos, A. Baláž, M. Chovanec, In: Towards Intelligent Engineering and Information Technology, Volume 243, Studies in Computational Intelligence (Springer, Berlin, Heidelberg, 2009) 389–403 http://dx.doi.org/10.1007/978-3-642-03737-5_28CrossrefGoogle Scholar

  • [3] P. Fanfara, A. Pekár, Usage of Hybrid Honeypots an Intrusion Detection System Mechanism, SCYR 2012: Proceedings from conference: 12th Scientific Conference of Young Researchers, 2012 Google Scholar

  • [4] S. Sonawane, Sh. Pardeshi, G. Pradad, A Survey on Intrusion Detection Techniques (Department of Information Technology, Technocrats Institute of Technology, Bhopal, India, April 2012) Google Scholar

  • [5] V. Marinova-Boncheva, A Short Survey of Intrusion Detection Systems (Institute of Information Technologies, Sofia, 2007) Google Scholar

  • [6] N. Jacob, C. Brodley, Offloading IDS Computation to the GPU (Computer Science Department, Tufts University, Medford, 2006) Google Scholar

  • [7] J.B.D. Cabrera, W. Lee, R.K. Mehra, On the Statistical Distribution of Processing Times in Network Intrusion Detection, CDC., 43rd IEEE Conference on Decision and Control vol. 1 (IEEE, 2004) 75–80 Google Scholar

  • [8] M.S. Clos, A Framework for Network Traffic Analysis Using GPUs (Universitat Politecnica de Catalunya, Barcelona, 2010) Google Scholar

  • [9] Huang N., Hung H., Lai S., Chu Y., Tsai W., A GPU-based Multiple-pattern Marching Algorithm for Network Intrusion Detection Systems, 22nd International Conference on Advanced Information Networking and Applications, Workshops, 2008. Google Scholar

  • [10] S. Wu, U. Manber, A Fast Algorithm for Multipattern Searching, Technical Report TR-94-17 (Department of Computer Science, University of Arizona, 1994) Google Scholar

  • [11] Ch. Hung, Ch. Lin, H. Wang, Ch. Chang, Efficient Packet Pattern Matching for Gigabit Network Intrusion Detection using GPUs, 14th International Conference on High Performance Computing and Communications (IEEE, Liverpool, 2012) Google Scholar

  • [12] A.V. Aho, M.J. Corasick, Efficient string matching: An aid to bibliographic search, Communications of the ACM 20, 761–772, 1977 Google Scholar

  • [13] M. Alshawabkeh, B. Jang, D. Kaeli, Accelerating the Local Outlier Factor Algorithm on a GPU for Intrusion Detection Systems (Dept. of Electrical and Computer Engineering, Northeastern University, Boston, MA, 2010) Google Scholar

  • [14] G. Vasiliadis, M. Polychronakis, S. Ioannidis, MIDeA: A Multi-Parallel Intrusion Detection Architecture (FORTHICS, Greece, 2011) Google Scholar

  • [15] A.P.M. Sathik, Parrallelizing a Network Intrusion Detection System using a GPU, (B. Tech. University of Kerala, India, 2012) Google Scholar

  • [16] G. Vasiliadis, S. Antonatos, M. Polychronakis, E.P. Markatos, S. Ioannidis, Gnort: High Performance Network Intrusion Detection Using Graphics Processors, Proceedings: The 11th international symposium on Recent Advances in Intrusion Detection, Sept. 15–17 (Springer, Berlin, Heidelberg, Cambridge, MA, USA, 2008) Google Scholar

  • [17] L. Vokorokos, M. Ennert, M. Cajkovský, A. Turínska, A Distributed Nerwork Intrusion Detection System Architecture Based on Computer Stations using GPGPU, INES 2013: IEEE 17th International Conference on Intelligent Engineering Systems, Costa Rica, Budapest, 2013 Google Scholar

About the article

Published Online: 2014-10-08

Published in Print: 2014-12-01


Citation Information: Open Computer Science, ISSN (Online) 2299-1093, DOI: https://doi.org/10.2478/s13537-014-0213-6.

Export Citation

© 2014 Versita Warsaw. This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 3.0 License. BY-NC-ND 3.0

Comments (0)

Please log in or register to comment.
Log in