Carregant...
Carregant...

Vés al contingut (premeu Retorn)

Hardware/software mechanisms for protecting an IDS against algorithmic complexity attacks

Autor
Sreekar Shenoy, G.; Tubella, J.; Gonzalez, A.
Tipus d'activitat
Presentació treball a congrés
Nom de l'edició
IEEE 26th International Parallel and Distributed Processing Symposium
Any de l'edició
2012
Data de presentació
2012
Llibre d'actes
IEEE 26th International Parallel and Distributed Processing Symposium workshops & PhD forum (IPDPSW), 2012: 21-25 May 2012, Shanghai, China
Pàgina inicial
1190
Pàgina final
1196
Editor
Institute of Electrical and Electronics Engineers (IEEE)
DOI
https://doi.org/10.1109/IPDPSW.2012.145 Obrir en finestra nova
Repositori
http://hdl.handle.net/2117/19426 Obrir en finestra nova
URL
http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6270773 Obrir en finestra nova
Resum
Intrusion Detection Systems (IDS) have emerged as one of the most promising ways to secure systems in the network. An IDS like the popular Snort[17] detects attacks on the network using a database of previous attacks. So in order to detect these attack strings in the packet, Snort uses the Aho-Corasick algorithm. This algorithm first constructs a Finite State Machine (FSM) from the attack strings, and subsequently traverses the FSM using bytes from the packet. We observe that there are input byt...
Citació
Sreekar Shenoy, G.; Tubella, J.; González, A. Hardware/software mechanisms for protecting an IDS against algorithmic complexity attacks. A: IEEE International Parallel and Distributed Processing Symposium. "Proceedings of the 2012 IEEE 26th International Parallel and Distributed Processing Symposium: workshops: 21-25 May 2012, Shanghai, China". Shanghai: Institute of Electrical and Electronics Engineers (IEEE), 2012, p. 1190-1196.
Paraules clau
Defense mechanisms, Hardware support, Intrusion detection systems
Grup de recerca
ARCO - Microarquitectura i Compiladors

Participants