Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You or Your Team.

Learn More →

Towards NIC-based intrusion detection

Towards NIC-based intrusion detection Towards NIC-based Intrusion Detection M. Otey, S. Parthasarathy, A. Ghoting, G. Li, S. Narravula, D. Panda Department of Computer and Information Science, The Ohio State University Contact Email: otey,srini @cis.ohio-state.edu ¡ ABSTRACT We present and evaluate a NIC-based network intrusion detection system. Intrusion detection at the NIC makes the system potentially tamper-proof and is naturally extensible to work in a distributed setting. Simple anomaly detection and signature detection based models have been implemented on the NIC rmware, which has its own processor and memory. We empirically evaluate such systems from the perspective of quality and performance (bandwidth of acceptable messages) under varying conditions of host load. The preliminary results we obtain are very encouraging and lead us to believe that such NIC-based security schemes could very well be a crucial part of next generation network security systems. Keywords network security, network interface cards, NICs, network intrusion detection, data mining Categories and Subject Descriptors I.5.2 [Pattern Recognition]: Design Methodology - classi er design and evaluation 1. INTRODUCTION In today ™s information age, where nearly every organization is dependent on the Internet to survive, it is imperative to guarantee the privacy and security of the information being exchanged. This issue http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png

Towards NIC-based intrusion detection

Association for Computing Machinery — Aug 24, 2003

Loading next page...
 
/lp/association-for-computing-machinery/towards-nic-based-intrusion-detection-k3uUIhtPQK

References (34)

Datasource
Association for Computing Machinery
Copyright
Copyright © 2003 by ACM Inc.
ISBN
1-58113-737-0
doi
10.1145/956750.956847
Publisher site
See Article on Publisher Site

Abstract

Towards NIC-based Intrusion Detection M. Otey, S. Parthasarathy, A. Ghoting, G. Li, S. Narravula, D. Panda Department of Computer and Information Science, The Ohio State University Contact Email: otey,srini @cis.ohio-state.edu ¡ ABSTRACT We present and evaluate a NIC-based network intrusion detection system. Intrusion detection at the NIC makes the system potentially tamper-proof and is naturally extensible to work in a distributed setting. Simple anomaly detection and signature detection based models have been implemented on the NIC rmware, which has its own processor and memory. We empirically evaluate such systems from the perspective of quality and performance (bandwidth of acceptable messages) under varying conditions of host load. The preliminary results we obtain are very encouraging and lead us to believe that such NIC-based security schemes could very well be a crucial part of next generation network security systems. Keywords network security, network interface cards, NICs, network intrusion detection, data mining Categories and Subject Descriptors I.5.2 [Pattern Recognition]: Design Methodology - classi er design and evaluation 1. INTRODUCTION In today ™s information age, where nearly every organization is dependent on the Internet to survive, it is imperative to guarantee the privacy and security of the information being exchanged. This issue

There are no references for this article.