Matches in SemOpenAlex for { <https://semopenalex.org/work/W2973285870> ?p ?o ?g. }
Showing items 1 to 68 of
68
with 100 items per page.
- W2973285870 abstract "Purpose The service denial threats are regularly regarded as tools for effortlessly triggering online-based services offline. Moreover, the present occurrences reveal that these threats are being constantly employed for masking other vulnerable threats like disseminating malware, information losses, wire scams and mining bitcoins (Sujithra et al., 2018; Boujnouni and Jedra, 2018). In some cases, service denials have been employed to cyberheist financial firms which sums around $100,000. Documentation from Neustar accounts that is about 70 percent of the financial sector are aware of the threat, and therefore, incidents result in few losses, more than 35 percent of service denial attempts are identified as malware soon after the threat is sent out (Divyavani and Dileep Kumar Reddy, 2018). Intensive packet analysis (IPA) explores the packet headers from Layers 2 to 4 along with the application information layer from Layers 5 to 7 for locating and evading vulnerable network-related threats. The networked systems could be simply contained by low potent service denial operations in case the supplies of the systems are minimized by the safety modules. The paper aims to discuss these issues. Design/methodology/approach The initial feature will be resolved using the IPDME by locating the standard precise header delimiters such as carriage return line feed equally locating the header names. For the designed IPDME, the time difficulties in locating the initial position of the header field within a packet with static time expenses of four cycles. For buffering packets, the framework functions at the speed of cables. Soon after locating the header position, the value of the field is mined linearly from the position. Mining all the field values consequentially resolves the forthcoming restrictions which could be increased by estimating various information bytes per cycle and omitting non-required information packets. In this way, the exploration space is minimized from the packet length to the length of the header. Because of the minimized mining time, the buffered packets could be operated at an increasing time. Findings Based on the assessments of IPDME against broadly employed SIP application layer function tools it discloses hardware offloading of IPDME it could minimize the loads on the essential system supplies of about 25 percent. The IPDME reveals that the acceleration of 22X– 75X as evaluated against PJSIP parser and SNORT SIP pre-processor. One IPDME portrays an acceleration of 4X–6X during 12 occurrences of SNORT parsers executing on 12 processors. The IPDME accomplishes 3X superior to 200 parallel occurrences of GPU speeded up processors. Additionally, the IPDME has very minimal latencies with 12X–1,010X minimal than GPUs. IPDME accomplishes minimal energy trails of nearly 0.75 W using two engines and for 15 engines it is 3.6 W, which is 22.5X–100X less as evaluated to the graphic-based GPU speeding up. Originality/value IPDME assures that the system pools are not fatigued on Layer 7 mining by transmitting straightforwardly based on network intrusions without branching into the operating systems. IPDME averts the latencies because of the memory accesses by sidestepping the operating system which essentially permits the scheme to function at wired speed. Based on the safety perception, IPDME ultimately enhances the performance of the safety systems employing them. The increased bandwidth of the IPDME assures that the IPA’s could function at their utmost bandwidth. The service time for the threat independent traffic is enhanced because of minimization over the comprehensive latencies over the path among the network intrusions and the related applications." @default.
- W2973285870 created "2019-09-26" @default.
- W2973285870 creator A5026756310 @default.
- W2973285870 date "2019-10-14" @default.
- W2973285870 modified "2023-09-26" @default.
- W2973285870 title "Intensive packet domain mining engine (IPDME)" @default.
- W2973285870 cites W1484711773 @default.
- W2973285870 cites W2747144285 @default.
- W2973285870 cites W2772776048 @default.
- W2973285870 cites W2782598579 @default.
- W2973285870 cites W2789337632 @default.
- W2973285870 cites W2799507529 @default.
- W2973285870 doi "https://doi.org/10.1108/ijius-03-2019-0018" @default.
- W2973285870 hasPublicationYear "2019" @default.
- W2973285870 type Work @default.
- W2973285870 sameAs 2973285870 @default.
- W2973285870 citedByCount "0" @default.
- W2973285870 crossrefType "journal-article" @default.
- W2973285870 hasAuthorship W2973285870A5026756310 @default.
- W2973285870 hasConcept C110875604 @default.
- W2973285870 hasConcept C136764020 @default.
- W2973285870 hasConcept C144133560 @default.
- W2973285870 hasConcept C158379750 @default.
- W2973285870 hasConcept C162853370 @default.
- W2973285870 hasConcept C2780378061 @default.
- W2973285870 hasConcept C31258907 @default.
- W2973285870 hasConcept C38652104 @default.
- W2973285870 hasConcept C38822068 @default.
- W2973285870 hasConcept C41008148 @default.
- W2973285870 hasConcept C48105269 @default.
- W2973285870 hasConceptScore W2973285870C110875604 @default.
- W2973285870 hasConceptScore W2973285870C136764020 @default.
- W2973285870 hasConceptScore W2973285870C144133560 @default.
- W2973285870 hasConceptScore W2973285870C158379750 @default.
- W2973285870 hasConceptScore W2973285870C162853370 @default.
- W2973285870 hasConceptScore W2973285870C2780378061 @default.
- W2973285870 hasConceptScore W2973285870C31258907 @default.
- W2973285870 hasConceptScore W2973285870C38652104 @default.
- W2973285870 hasConceptScore W2973285870C38822068 @default.
- W2973285870 hasConceptScore W2973285870C41008148 @default.
- W2973285870 hasConceptScore W2973285870C48105269 @default.
- W2973285870 hasLocation W29732858701 @default.
- W2973285870 hasOpenAccess W2973285870 @default.
- W2973285870 hasPrimaryLocation W29732858701 @default.
- W2973285870 hasRelatedWork W109237590 @default.
- W2973285870 hasRelatedWork W154449179 @default.
- W2973285870 hasRelatedWork W184495534 @default.
- W2973285870 hasRelatedWork W2037047765 @default.
- W2973285870 hasRelatedWork W2077688755 @default.
- W2973285870 hasRelatedWork W2080219160 @default.
- W2973285870 hasRelatedWork W2318499274 @default.
- W2973285870 hasRelatedWork W2508889328 @default.
- W2973285870 hasRelatedWork W2523163956 @default.
- W2973285870 hasRelatedWork W2557530695 @default.
- W2973285870 hasRelatedWork W2567718815 @default.
- W2973285870 hasRelatedWork W2618266561 @default.
- W2973285870 hasRelatedWork W2773380663 @default.
- W2973285870 hasRelatedWork W2899052798 @default.
- W2973285870 hasRelatedWork W2957218875 @default.
- W2973285870 hasRelatedWork W3142591856 @default.
- W2973285870 hasRelatedWork W2273663756 @default.
- W2973285870 hasRelatedWork W2414471973 @default.
- W2973285870 hasRelatedWork W2745977839 @default.
- W2973285870 hasRelatedWork W2774694259 @default.
- W2973285870 isParatext "false" @default.
- W2973285870 isRetracted "false" @default.
- W2973285870 magId "2973285870" @default.
- W2973285870 workType "article" @default.