期刊文献+

基于GPU的高速网络入侵检测系统设计 被引量:1

High speed NIDS design based on GPU
下载PDF
导出
摘要 随着网络带宽的不断增加,以及处理能力的限制,传统的网络入侵检测系统(Network Intrusion Detecting System,NIDS)面临挑战,如何提高NIDS的处理能力备受关注。通过专用设备提高检测速度,不但价格昂贵且无法大规模普及。通过对Linux网络协议栈的优化,以及常用入侵检测系统Snort的多线程化,结合了图形处理器(Graphic Processing Unit,GPU)的高性能并行计算能力,设计了一种高性能的软件入侵检测架构,突破现有NIDS使用普通CPU的计算瓶颈,以应对高速链路对入侵检测性能的要求。实验结果表明,高速网络中的数据包可以采用GPU来处理。 With the continuous increase in network bandwidth and the capacity constraints,the traditional Network Intrusion Detection Systems(NIDS) is facing challenges.How to improve the efficiency of NIDS in high-speed network environment is facing challenges.Specially designed acceleration hardware is used to improve the detection rate,which is not only of high costs and inflexibility,but also only applicable to special institutions and not suitable to a large-scale popularization and promo-tion.An NIDS is presented based on the Snort opensource that exploits the powerful high-performance of GPU parallel processing capability,combining with the optimized Linux networking stack and multiple threads of Snort,and a high-performance soft-ware intrusion detection structure is designed.The experimental results show that GPU is very suitable for high speed network.
作者 卢永菁 王东
出处 《计算机工程与应用》 CSCD 北大核心 2011年第33期78-81,共4页 Computer Engineering and Applications
关键词 网络入侵检测系统(NIDS) 图形处理器(GPU) SNORT 并行计算 Network Intrusion Detection Systems(NIDS) Graphic Processing Uni(tGPU) Snort parallel computing
  • 相关文献

参考文献10

  • 1孙蔚敏.2006年网络安全工作报告[R].北京:国家计算机网络应急技术处理协调中心.2006. 被引量:2
  • 2李庚,韩进,谢立.入侵检测中一种新的多模式匹配算法[J].计算机应用研究,2008,25(8):2474-2476. 被引量:8
  • 3王卫平,朱卫未,陈文惠,梁樑.基于网络的入侵检测系统数据包采样策略研究[J].中国科学院研究生院学报,2006,23(4):534-542. 被引量:3
  • 4Fang Yu, Katz R H, Lakshman T V.A multi-gigabit rate deep packet inspection algorithm using TCAM[C]//ICNP 2004,2004. 被引量:1
  • 5Fatahalian K, Houston M.A closer look at GPUs[J].Communica- tions of the ACM,2008,S1:50-57. 被引量:1
  • 6Owens K D,Luebke D,(3ovindaraju N,et al.A survey of gener- al-purpose computation on graphics hardware[J].Computer Graph- ics Forum.2007.26: 80-113. 被引量:1
  • 7Aho A' V, Corasick M J.Efficicnt string matching: an aid to bib- liographic seaxch[J].Communications of the ACM, 1975, 18 (6) : 333-340. 被引量:1
  • 8Receive-side scaling enhancements in Windows server[EB/OL]. ( 2008 ) .http://www.microsoft.com/whdc/device/network/ndis rss. mspx. 被引量:1
  • 9Torrellas J,Lam H S, Hennessy J L.False sharing and spatial lo- cality in mulfiprocessor caches[~,IEEE Trans on Computers, 1994, 43(6) :651-663. 被引量:1
  • 10Vasiliadis G,Antonatos S,Polychronakis M,et al.Craort:high per- formance network intrusion detection using graphics processors[C]// Lippmann R,Kirda E,Trachtenberg A,RAID 2008,2008,. 被引量:1

二级参考文献17

共引文献9

同被引文献7

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部