QQ登录

只需要一步,快速开始

 注册地址  找回密码
查看: 949|回复: 0
打印 上一主题 下一主题

[其他资源] Towards Accelerating Intrusion Detection Operations at the Edge Network usin...

[复制链接]
字体大小: 正常 放大
杨利霞        

5273

主题

82

听众

17万

积分

  • TA的每日心情
    开心
    2021-8-11 17:59
  • 签到天数: 17 天

    [LV.4]偶尔看看III

    网络挑战赛参赛者

    网络挑战赛参赛者

    自我介绍
    本人女,毕业于内蒙古科技大学,担任文职专业,毕业专业英语。

    群组2018美赛大象算法课程

    群组2018美赛护航培训课程

    群组2019年 数学中国站长建

    群组2019年数据分析师课程

    群组2018年大象老师国赛优

    跳转到指定楼层
    1#
    发表于 2020-11-9 15:29 |只看该作者 |倒序浏览
    |招呼Ta 关注Ta
    Towards Accelerating Intrusion Detection

    8 r- w3 a$ v+ s) G+ @
    Operations at the Edge Network using FPGAs
    7 Y3 J0 W7 n4 I! ]0 f
    : m/ j, v9 \5 s+ N8 [3 b
    % k3 d+ v; D: I
      l) e2 |4 f3 \; d' f( n
    In the current paper, we present our work towards 1 s9 [- @- R% E% m  T
    accelerating intrusion detection operations at the edge network
    / ~  A# Q$ A1 }6 X; W# n7 x. `using FPGAs. Cloud computing and network function
    5 ^, F  O. D7 ~6 Nvirtualization have led to a new appealing paradigm for service ' t  b4 P) N% p* E) o
    delivery and management. Unfortunately, this paradigm fails 1 A5 B5 j: ~% O  I5 c, f; j
    to correctly support IoT applications and services that seek
    ( p1 [9 S; L+ u, r0 Bbetter communication platforms. Security as a Service can also % X) k! x  `7 r% P! J0 V: i
    be seen as a cloud-based model that needs to be accommodated
    . z  b8 A" s& t" Eto fulfill these services requirements. Again, one of the main
    9 T+ p' Q) s' missues to be addressed in this context is how to improve the
      e( b! G2 z+ C5 D# jperformance of such systems or services in order to make them 9 K9 V4 z, t- j5 R
    capable of coping with the huge amount of data while
    & d/ z# S* F9 S$ R3 o6 D* ^/ Jremaining reliable. A potential solution is the FPGA based " F6 Z/ z* J" w* _
    edge computing, which is a powerful combination offering : \; h1 A- E$ Z: Y1 V0 t; Z
    FPGA acceleration capabilities together with edge and fog
    ( X2 u: o) x) j7 ~8 f" `+ Kbenefits. Indeed, our work focusses on devising an Intrusion
    3 ^# K4 ?" W8 ~Prevention architecture called FORTISEC (40SEC), that is
    ) {0 G  c2 s7 @6 G6 y# p  r2 lmeant to operate in a completely softwarized as well as in an & ]; i+ c* X, L7 h2 T
    FPGA mode. Thereby, we present suitable algorithms, design " |/ M$ V# R& Q* w
    principles and well defined components towards the
    ) O" Z2 O3 E2 zimplementation of accelerated intrusion prevention on the 4 f% l+ ~6 A2 c# W/ G
    edge. We also present a testbed being utilized for the . k$ a4 _' i+ K9 \
    implementation of 40SEC and its performance testing.
    4 T2 d7 z/ ?) L3 O  }; U. l
    3 o  N+ n& R3 |+ F
    9 g) q8 V) w# x" X: |0 L1 l8 H9 Z

    Towards Accelerating Intrusion Detection.pdf

    1.41 MB, 下载次数: 0, 下载积分: 体力 -2 点

    zan
    转播转播0 分享淘帖0 分享分享0 收藏收藏0 支持支持0 反对反对0 微信微信
    您需要登录后才可以回帖 登录 | 注册地址

    qq
    收缩
    • 电话咨询

    • 04714969085
    fastpost

    关于我们| 联系我们| 诚征英才| 对外合作| 产品服务| QQ

    手机版|Archiver| |繁體中文 手机客户端  

    蒙公网安备 15010502000194号

    Powered by Discuz! X2.5   © 2001-2013 数学建模网-数学中国 ( 蒙ICP备14002410号-3 蒙BBS备-0002号 )     论坛法律顾问:王兆丰

    GMT+8, 2026-4-13 01:12 , Processed in 0.400565 second(s), 54 queries .

    回顶部