QQ登录

只需要一步,快速开始

 注册地址  找回密码
查看: 953|回复: 0
打印 上一主题 下一主题

[其他资源] Towards Accelerating Intrusion Detection Operations at the Edge Network usin...

[复制链接]
字体大小: 正常 放大
杨利霞        

5273

主题

82

听众

17万

积分

  • TA的每日心情
    开心
    2021-8-11 17:59
  • 签到天数: 17 天

    [LV.4]偶尔看看III

    网络挑战赛参赛者

    网络挑战赛参赛者

    自我介绍
    本人女,毕业于内蒙古科技大学,担任文职专业,毕业专业英语。

    群组2018美赛大象算法课程

    群组2018美赛护航培训课程

    群组2019年 数学中国站长建

    群组2019年数据分析师课程

    群组2018年大象老师国赛优

    跳转到指定楼层
    1#
    发表于 2020-11-9 15:29 |只看该作者 |倒序浏览
    |招呼Ta 关注Ta
    Towards Accelerating Intrusion Detection

    ; a+ Q! v9 o7 V/ Q' C
    Operations at the Edge Network using FPGAs
    - o3 Y: M' B! H; G

    ! _- |/ E2 p  ^1 S' m1 S3 B0 R
    . H! m/ v  N; O- _
    7 x- y, |8 h; Y. \9 U1 Z5 e In the current paper, we present our work towards 5 L+ ^& T2 _/ W' f' N
    accelerating intrusion detection operations at the edge network
    : m$ q* J* K1 B3 U9 fusing FPGAs. Cloud computing and network function
    ) {9 ~9 @/ ^0 ]. n0 jvirtualization have led to a new appealing paradigm for service
    1 Y; A3 W3 S. x1 h( K* }delivery and management. Unfortunately, this paradigm fails 2 L2 P1 b9 w$ X6 {  h- L5 H. s
    to correctly support IoT applications and services that seek
    , L. n( f: N% Dbetter communication platforms. Security as a Service can also
    ) T, g# N) {/ b' u5 c- Qbe seen as a cloud-based model that needs to be accommodated
    / x6 W) Q9 ~9 i3 d" Y+ Bto fulfill these services requirements. Again, one of the main
    4 s" t; n3 q+ p) b5 o! f+ Bissues to be addressed in this context is how to improve the * D; C4 l# F) y* ~- M0 m0 v
    performance of such systems or services in order to make them + A" F) c5 ~  i* p% \) `' z
    capable of coping with the huge amount of data while # `- R5 w6 q, n+ f) {
    remaining reliable. A potential solution is the FPGA based " L/ j2 `- ^' d) I5 H1 L1 v1 Z
    edge computing, which is a powerful combination offering
    : B# @( r. s& @3 dFPGA acceleration capabilities together with edge and fog
    : o- J& G& V3 _5 d% k5 g1 d* `3 x/ gbenefits. Indeed, our work focusses on devising an Intrusion 9 b7 p/ n6 g' K3 U+ c' U& t
    Prevention architecture called FORTISEC (40SEC), that is : @/ }, U! H% p! t
    meant to operate in a completely softwarized as well as in an
    1 |" U9 d9 Y" y) M5 S9 uFPGA mode. Thereby, we present suitable algorithms, design 6 R4 h0 ^! U* }
    principles and well defined components towards the : }6 ^& c5 y& ?$ L
    implementation of accelerated intrusion prevention on the
      e0 b4 [; Q% E1 oedge. We also present a testbed being utilized for the $ O* d: K! `$ g( L
    implementation of 40SEC and its performance testing. , {; g6 [2 S  O. u8 e: H# J2 ?
    " M  z7 d; v# f

    % L" k! {+ y5 G" |

    Towards Accelerating Intrusion Detection.pdf

    1.41 MB, 下载次数: 0, 下载积分: 体力 -2 点

    zan
    转播转播0 分享淘帖0 分享分享0 收藏收藏0 支持支持0 反对反对0 微信微信
    您需要登录后才可以回帖 登录 | 注册地址

    qq
    收缩
    • 电话咨询

    • 04714969085
    fastpost

    关于我们| 联系我们| 诚征英才| 对外合作| 产品服务| QQ

    手机版|Archiver| |繁體中文 手机客户端  

    蒙公网安备 15010502000194号

    Powered by Discuz! X2.5   © 2001-2013 数学建模网-数学中国 ( 蒙ICP备14002410号-3 蒙BBS备-0002号 )     论坛法律顾问:王兆丰

    GMT+8, 2026-4-14 19:28 , Processed in 0.416432 second(s), 56 queries .

    回顶部