Matches in SemOpenAlex for { <https://semopenalex.org/work/W4387546277> ?p ?o ?g. }
Showing items 1 to 71 of
71
with 100 items per page.
- W4387546277 endingPage "1" @default.
- W4387546277 startingPage "1" @default.
- W4387546277 abstract "Currently, with the increasing popularity of high-speed network, in order to protect the network environment, more and more companies start to explore how to efficiently detect malicious traffic. On the software side, traditional detection systems are usually based on CPU which will consume multi-core processing ability to handle huge network traffic. On the hardware side, current researches focus on using specific hardware to accelerate string matching process in malicious traffic detection. However, they cannot detect network attack behaviors hidden in TCP out-of-order (OOO) packets, which are very common in modern complex network environments. To deal with this problem, we present an FPGA-based realtime malicious traffic detection method especially to inspect TCP OOO packets. It employs two core function designs for efficient malicious traffic inspection: TCP OOO reassembly and hierarchical packet match. First, the TCP OOO packets are reassembled to in-order packets to prevent the omission check of malicious traffic. Second, we adapt a hierarchical packet match design which can not only detect the packet header and cut down matching traffic, but also has the ability to inspect the carried payload to further determine whether the traffic is benign or malicious. We use Xilinx Alveo U50 accelerator card as the implementation platform to achieve high speed detection. This paper aims to provide a full detection path and implement all the reassembly and inspection process within a FPGA board. We adapt Cisco TRex as the traffic generator to evaluate the system from detection throughput, resource utilization and power consumption. Compared with the CPU-based approaches, the experiment results show that our system has 485% detection throughput increase and 68% average power decrease." @default.
- W4387546277 created "2023-10-12" @default.
- W4387546277 creator A5021521170 @default.
- W4387546277 creator A5025635681 @default.
- W4387546277 creator A5038815138 @default.
- W4387546277 creator A5086392139 @default.
- W4387546277 date "2023-01-01" @default.
- W4387546277 modified "2023-10-12" @default.
- W4387546277 title "Realtime Malicious Traffic Detection targeted for TCP Out-of-Order Packets based on FPGA" @default.
- W4387546277 doi "https://doi.org/10.1109/access.2023.3323853" @default.
- W4387546277 hasPublicationYear "2023" @default.
- W4387546277 type Work @default.
- W4387546277 citedByCount "0" @default.
- W4387546277 crossrefType "journal-article" @default.
- W4387546277 hasAuthorship W4387546277A5021521170 @default.
- W4387546277 hasAuthorship W4387546277A5025635681 @default.
- W4387546277 hasAuthorship W4387546277A5038815138 @default.
- W4387546277 hasAuthorship W4387546277A5086392139 @default.
- W4387546277 hasBestOaLocation W43875462771 @default.
- W4387546277 hasConcept C111919701 @default.
- W4387546277 hasConcept C134066672 @default.
- W4387546277 hasConcept C149635348 @default.
- W4387546277 hasConcept C157764524 @default.
- W4387546277 hasConcept C158379750 @default.
- W4387546277 hasConcept C201100257 @default.
- W4387546277 hasConcept C204679922 @default.
- W4387546277 hasConcept C2779581428 @default.
- W4387546277 hasConcept C31258907 @default.
- W4387546277 hasConcept C41008148 @default.
- W4387546277 hasConcept C42935608 @default.
- W4387546277 hasConcept C46451311 @default.
- W4387546277 hasConcept C48105269 @default.
- W4387546277 hasConcept C555944384 @default.
- W4387546277 hasConcept C74366991 @default.
- W4387546277 hasConcept C79403827 @default.
- W4387546277 hasConceptScore W4387546277C111919701 @default.
- W4387546277 hasConceptScore W4387546277C134066672 @default.
- W4387546277 hasConceptScore W4387546277C149635348 @default.
- W4387546277 hasConceptScore W4387546277C157764524 @default.
- W4387546277 hasConceptScore W4387546277C158379750 @default.
- W4387546277 hasConceptScore W4387546277C201100257 @default.
- W4387546277 hasConceptScore W4387546277C204679922 @default.
- W4387546277 hasConceptScore W4387546277C2779581428 @default.
- W4387546277 hasConceptScore W4387546277C31258907 @default.
- W4387546277 hasConceptScore W4387546277C41008148 @default.
- W4387546277 hasConceptScore W4387546277C42935608 @default.
- W4387546277 hasConceptScore W4387546277C46451311 @default.
- W4387546277 hasConceptScore W4387546277C48105269 @default.
- W4387546277 hasConceptScore W4387546277C555944384 @default.
- W4387546277 hasConceptScore W4387546277C74366991 @default.
- W4387546277 hasConceptScore W4387546277C79403827 @default.
- W4387546277 hasFunder F4320322916 @default.
- W4387546277 hasFunder F4320334789 @default.
- W4387546277 hasLocation W43875462771 @default.
- W4387546277 hasOpenAccess W4387546277 @default.
- W4387546277 hasPrimaryLocation W43875462771 @default.
- W4387546277 hasRelatedWork W1583843371 @default.
- W4387546277 hasRelatedWork W1583906151 @default.
- W4387546277 hasRelatedWork W166608820 @default.
- W4387546277 hasRelatedWork W2037047765 @default.
- W4387546277 hasRelatedWork W2080202421 @default.
- W4387546277 hasRelatedWork W2119461845 @default.
- W4387546277 hasRelatedWork W2161402239 @default.
- W4387546277 hasRelatedWork W2949949254 @default.
- W4387546277 hasRelatedWork W815623786 @default.
- W4387546277 hasRelatedWork W2514988192 @default.
- W4387546277 isParatext "false" @default.
- W4387546277 isRetracted "false" @default.
- W4387546277 workType "article" @default.