QQ登录

只需要一步,快速开始

 注册地址  找回密码
查看: 950|回复: 0
打印 上一主题 下一主题

[其他资源] Towards Accelerating Intrusion Detection Operations at the Edge Network usin...

[复制链接]
字体大小: 正常 放大
杨利霞        

5273

主题

82

听众

17万

积分

  • TA的每日心情
    开心
    2021-8-11 17:59
  • 签到天数: 17 天

    [LV.4]偶尔看看III

    网络挑战赛参赛者

    网络挑战赛参赛者

    自我介绍
    本人女,毕业于内蒙古科技大学,担任文职专业,毕业专业英语。

    群组2018美赛大象算法课程

    群组2018美赛护航培训课程

    群组2019年 数学中国站长建

    群组2019年数据分析师课程

    群组2018年大象老师国赛优

    跳转到指定楼层
    1#
    发表于 2020-11-9 15:29 |只看该作者 |正序浏览
    |招呼Ta 关注Ta
    Towards Accelerating Intrusion Detection
      h/ g6 M4 E! t4 y
    Operations at the Edge Network using FPGAs
    - R. B! [6 ^8 r

    : W" d7 S7 ?3 B+ A! L1 ?% i8 H# m( g& g5 ]2 @
    " W2 ^; ^# A* b
    In the current paper, we present our work towards
    / e% n8 O% Q9 |; uaccelerating intrusion detection operations at the edge network
    6 a# r/ {2 \5 vusing FPGAs. Cloud computing and network function
      E" N$ a( G' O3 b1 avirtualization have led to a new appealing paradigm for service
    ' g* G- F2 L5 ^5 C: ~" X/ c& B  qdelivery and management. Unfortunately, this paradigm fails + W/ ^, x% S' o; Z' `* @( D; m
    to correctly support IoT applications and services that seek ! h; S% C, Q/ n* c  ?8 Y; U
    better communication platforms. Security as a Service can also + R, `7 y8 Z  k1 F
    be seen as a cloud-based model that needs to be accommodated
    6 m1 O7 u, d8 p7 R, p7 N% kto fulfill these services requirements. Again, one of the main $ x0 b0 S7 m6 j  U% {
    issues to be addressed in this context is how to improve the : p% U6 `3 h% @: T
    performance of such systems or services in order to make them
    " z1 b. x/ c5 }, ^* dcapable of coping with the huge amount of data while " @: {2 N' ^) w  i8 h
    remaining reliable. A potential solution is the FPGA based 5 H/ A- V' l1 x7 A# D  T* C
    edge computing, which is a powerful combination offering
    . I$ @$ ^+ H. jFPGA acceleration capabilities together with edge and fog ) K# v1 x# V6 C# ^9 l0 I
    benefits. Indeed, our work focusses on devising an Intrusion * X/ w# P* e' a% z7 @
    Prevention architecture called FORTISEC (40SEC), that is & i% u% g) J& M8 c3 ]+ H* y
    meant to operate in a completely softwarized as well as in an
    * g: M6 ]2 ?- W0 ^0 v* V( |FPGA mode. Thereby, we present suitable algorithms, design 6 U0 V0 _/ ?# R1 X% q# \# C% b/ A! [
    principles and well defined components towards the - O! N; ?% ]8 m! A3 y" t" q8 @" t
    implementation of accelerated intrusion prevention on the 9 C7 o7 I4 j$ O/ T1 I
    edge. We also present a testbed being utilized for the
    0 r3 j' e: q" q: Simplementation of 40SEC and its performance testing.
    4 d; c" R( r* e, a: ~# E6 _% Z  Z
    2 d" h, w  a% [4 L
    . c. {2 A* f! H+ D

    Towards Accelerating Intrusion Detection.pdf

    1.41 MB, 下载次数: 0, 下载积分: 体力 -2 点

    zan
    转播转播0 分享淘帖0 分享分享0 收藏收藏0 支持支持0 反对反对0 微信微信
    您需要登录后才可以回帖 登录 | 注册地址

    qq
    收缩
    • 电话咨询

    • 04714969085
    fastpost

    关于我们| 联系我们| 诚征英才| 对外合作| 产品服务| QQ

    手机版|Archiver| |繁體中文 手机客户端  

    蒙公网安备 15010502000194号

    Powered by Discuz! X2.5   © 2001-2013 数学建模网-数学中国 ( 蒙ICP备14002410号-3 蒙BBS备-0002号 )     论坛法律顾问:王兆丰

    GMT+8, 2026-4-13 15:58 , Processed in 0.415082 second(s), 55 queries .

    回顶部