Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/251860
Title: FPGA based network intrusion detection system
Researcher: Jasmine C
Guide(s): Latha T
Keywords: Engineering and Technology,Engineering,Engineering Electrical and Electronic
FPGA
Intrusion Detection
Network Intrusion Detection
University: Anna University
Completed Date: 2018
Abstract: A Network Intrusion Detection System NIDS monitors a network for malicious activity The devices connected to internet are vulnerable to virus attacks spams Trojan horses Denial of Service DoS attack etc A firewall blocks unauthorized access to the network by checking MAC address/ IP address/ port number present in the header of a data packet But the NIDS checks the entire packet including header and payload. The NIDS can be classified as hardware NIDS and software NIDS The software NIDS are not able to meet the high speed of the today s networks and vulnerable to be compromised by hackers. But the hardware NIDS are not vulnerable to malware attacks. Moreover hardware NIDS is scalable to the growing demand of the networks and reliable Typically a NIDS includes two modules a signature matching module and an anomaly detection module The signature matching module identifies the existing viruses and it needs constant update The anomaly detection module can identify unknown or new malwares Hence the proposed system has been designed as a combination of both signature matching and anomaly detection Moreover the proposed method is implemented in FPGA hardware to provide reconfigurability speed and scalability requirements of the hardware based NIDS newlineThe main challenge associated with the signature matching system is the extreme power consumption due to intensive data comparison and memory space The extreme power consumption due to Content Addressable Memory CAM and hash based comparisons are replaced with a Lookup table based binary search Here a set of known signatures are compiled into merged Finite State machine FSM and the number of outgoing edges associated with the nodes of the FSM are used to construct the Lookup table The power consumed by the entire signature matching module is 27.44 mW newline newline
Pagination: xix, 128p.
URI: http://hdl.handle.net/10603/251860
Appears in Departments:Faculty of Information and Communication Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File39.73 kBAdobe PDFView/Open
02_certificates.pdf327.47 kBAdobe PDFView/Open
03_abstract.pdf63.64 kBAdobe PDFView/Open
04_acknowledgement.pdf62.63 kBAdobe PDFView/Open
05_contents.pdf82.62 kBAdobe PDFView/Open
06_list_of_tables.pdf62.99 kBAdobe PDFView/Open
07_list_of_figures.pdf64.83 kBAdobe PDFView/Open
08_list_of_abbreviations.pdf62.76 kBAdobe PDFView/Open
09_chapter1.pdf174.42 kBAdobe PDFView/Open
10_chapter2.pdf194.81 kBAdobe PDFView/Open
11_chapter3.pdf233.34 kBAdobe PDFView/Open
12_chapter4.pdf2.07 MBAdobe PDFView/Open
13_conclusion.pdf350.75 kBAdobe PDFView/Open
14_references.pdf759.33 kBAdobe PDFView/Open
15_list_of_publications.pdf68.46 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: