A New Platform NIDS Based On WEMA

Full Text (PDF, 447KB), PP.52-58

Views: 0 Downloads: 0

Author(s)

Adnan A. Hnaif 1,*

1. Al-zaytoonah University of Jordan, Computer Networks Department, Amman, 11733, Jordan

* Corresponding author.

DOI: https://doi.org/10.5815/ijitcs.2015.06.07

Received: 14 Sep. 2014 / Revised: 3 Jan. 2015 / Accepted: 17 Feb. 2015 / Published: 8 May 2015

Index Terms

Intrusion Detection Systems, Exact String Matching Algorithms, Multi-Threading Technology

Abstract

The increasing speed of today's computer networks directly affects the performance of Network Intrusion Detection Systems (NIDS) in terms of speed of detection of threads. Therefore, the performance of the existing algorithms needs to be improved to enhance the speed of detection engine used in NIDS applications. Hence, this paper defines a new platform NIDS to enhance the speed of detection engine based on Weighted Exact Matching Algorithm (WEMA). Furthermore, this platform can be run in sequential and in parallel mode, using the pthread techniques, in order to increase the total performance of NIDS applications.

Cite This Paper

Adnan A. Hnaif, "A New Platform NIDS Based On WEMA", International Journal of Information Technology and Computer Science(IJITCS), vol.7, no.6, pp.52-58, 2015. DOI:10.5815/ijitcs.2015.06.07

Reference

[1]Stallings, w. (2006). Cryptography and Network Security

[2]Muhammad Abedin, S. N. (2006), “Detection and Resolution of Anomalies in Firewall Policy Rules, “IFIP International Federation for Information Processing (pp. 15-29). E. Damiani and P. Liu (Eds.): Data and Applications Security 2006, LNCS 4127,.

[3]Li, W. (2004), “Using Genetic Algorithm for Network Intrusion Detection, “ In Proceedings of the United States Department of Energy Cyber Security Group 2004 Training Conference (pp. 1-9). Mississippi : Mississippi State University, Mississippi State, MS 39762.

[4]Sutapa Sarkar, and Brindha.M (2014), “High Performance Network Security Using NIDS Approach, “ I.J. Information Technology and Computer Science, 2014,07, 47-55 Published Online June 2014 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijitcs.2014.07.07 

[5]Lecroq, C. C. (2004), “Handbook of Exact String Matching Algorithm,“ King's College Publications ISBN:0954300645.

[6]Zhou, Y. X. (2008), “Using Multi-core Processors to Support Network Security Applications, “ 12th IEEE International Workshop on Future Trends of Distributed Computing Systems (pp. 213-218). IEEE-Computer Society.

[7]Rafiq, A. E.-K. (2004), “A fast String Search Algorithm for Deep Packet Classification,“ ELSEVIER-SCIENCE DIRECT , 1524-1538.

[8]Rong-Tai Liu, N.-F. H.-N.-H.-C. (2004), “A Fast Pattern-Match Engine for Network Processor-based Network Intrusion Detection Systems,“ Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC’04) (pp. 1-5). IEEE Computer Society.

[9]Abdallah A. Hlayel, Adnan A. Hnaif, “A New Exact Pattern Matching Algorithm (WEMA), “Journal of Applied Science, 13(24), 2013. ISSN 1812-5654 / DOI:10.3923/jas. Vol 14. 2013

[10]Edwin Verplanke, E. (2007), “Understand Packet Processing With Multi-core Processors, “. EETimes-indea, April 2007, pp.1-5.

[11]Bart Haagdorens1, T. V. (2004), “Improving the Performance of Signature-Based Network Intrusion Detection Sensors by Multi-threading, “Springer-Verlag Berlin Heidelberg , 188–203.