QQ登录

只需要一步,快速开始

 注册地址  找回密码
查看: 948|回复: 0
打印 上一主题 下一主题

[其他资源] Towards Accelerating Intrusion Detection Operations at the Edge Network usin...

[复制链接]
字体大小: 正常 放大
杨利霞        

5273

主题

82

听众

17万

积分

  • TA的每日心情
    开心
    2021-8-11 17:59
  • 签到天数: 17 天

    [LV.4]偶尔看看III

    网络挑战赛参赛者

    网络挑战赛参赛者

    自我介绍
    本人女,毕业于内蒙古科技大学,担任文职专业,毕业专业英语。

    群组2018美赛大象算法课程

    群组2018美赛护航培训课程

    群组2019年 数学中国站长建

    群组2019年数据分析师课程

    群组2018年大象老师国赛优

    跳转到指定楼层
    1#
    发表于 2020-11-9 15:29 |只看该作者 |倒序浏览
    |招呼Ta 关注Ta
    Towards Accelerating Intrusion Detection

    4 k; ~! F' |% h% ?9 C6 `, W6 Z
    Operations at the Edge Network using FPGAs

    . @4 \  U4 r  e. }( Q9 g9 C8 W9 s5 S7 E4 B  i; t# ^
    0 w2 x2 [! r. P2 o" J& }9 @/ ~4 X
    3 t0 x5 c5 {" v# d8 D) T& x; N+ j
    In the current paper, we present our work towards
    4 V9 U$ S5 K. @3 S, `- I' daccelerating intrusion detection operations at the edge network 6 e5 E* C. J3 N' @$ B6 a
    using FPGAs. Cloud computing and network function
    ' d- X! p0 G. q; Q# Xvirtualization have led to a new appealing paradigm for service
      V* q" z* E) W& ]# Sdelivery and management. Unfortunately, this paradigm fails : A$ f9 e2 G7 G7 m' \
    to correctly support IoT applications and services that seek " j2 f  l% `/ r5 f
    better communication platforms. Security as a Service can also , J6 V9 z" f0 K* z2 x: N
    be seen as a cloud-based model that needs to be accommodated % a$ y( h5 W3 H: Q1 B$ g$ G
    to fulfill these services requirements. Again, one of the main
    2 [/ _8 _8 L' m! L) a/ Zissues to be addressed in this context is how to improve the ) m0 a0 y  W: T9 A/ K
    performance of such systems or services in order to make them 6 f/ x' m/ z& X) a! I
    capable of coping with the huge amount of data while ) Y3 _$ b' _; E3 G6 D: Z
    remaining reliable. A potential solution is the FPGA based ( K' Y7 {9 k3 s4 m% F
    edge computing, which is a powerful combination offering $ v5 o8 a7 C- J9 {7 M$ E
    FPGA acceleration capabilities together with edge and fog
    + J2 K. E- Z5 q3 O: t+ q8 Jbenefits. Indeed, our work focusses on devising an Intrusion 8 m: F  c* N& R0 V- Z4 A4 k
    Prevention architecture called FORTISEC (40SEC), that is
    + P0 k  b0 |- U; s$ s) n0 n- _- u" qmeant to operate in a completely softwarized as well as in an
    6 U7 Y6 @& m: n! Q8 E$ k  wFPGA mode. Thereby, we present suitable algorithms, design
    4 N" C5 A' Z9 Qprinciples and well defined components towards the , A( G7 }, ], E8 n$ G$ s
    implementation of accelerated intrusion prevention on the
    - \3 n2 ^& y% h/ M( X0 |3 ^edge. We also present a testbed being utilized for the
    ! H- [6 b! U1 H1 Z6 Cimplementation of 40SEC and its performance testing.
    ' ^7 ^% ^, [! Z' _& ?7 J# k/ w% N
    / y/ ]1 a3 p& A8 d' P& i/ {) u: K* Z% p3 D

    Towards Accelerating Intrusion Detection.pdf

    1.41 MB, 下载次数: 0, 下载积分: 体力 -2 点

    zan
    转播转播0 分享淘帖0 分享分享0 收藏收藏0 支持支持0 反对反对0 微信微信
    您需要登录后才可以回帖 登录 | 注册地址

    qq
    收缩
    • 电话咨询

    • 04714969085
    fastpost

    关于我们| 联系我们| 诚征英才| 对外合作| 产品服务| QQ

    手机版|Archiver| |繁體中文 手机客户端  

    蒙公网安备 15010502000194号

    Powered by Discuz! X2.5   © 2001-2013 数学建模网-数学中国 ( 蒙ICP备14002410号-3 蒙BBS备-0002号 )     论坛法律顾问:王兆丰

    GMT+8, 2026-4-11 17:22 , Processed in 0.344555 second(s), 54 queries .

    回顶部