Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/345157
Title: | Improving intrusion detection system with efficient memory optimization in internet of things applications |
Researcher: | Suresh P |
Guide(s): | Sukumar R |
Keywords: | Intrusion detection Pattern matching Computer Science Information Systems |
University: | Anna University |
Completed Date: | 2020 |
Abstract: | Intrusion detection is an approach to security that also emerges in the networked environments. Formerly, Intrusion detection began as a technique for detecting masqueraders and misfeasors in standalone systems, but in the few years the focus of intrusion detection has moved to towards networks. Wireless-oriented Intrusion Detection Systems (WIDSs) is a source of events for the analysis on distributed system composed of many hosts and network links. WID Systems are also capable of comparing signatures for similar packets to link and drop harmful detected packets which have a signature matching the records in the WIDS. The goal of WIDS is to detect attacks that involve the network and may span different hosts. For maximum effectiveness, WIDSs should be able to interoperate with hostbased IDSs so that misuse patterns include both network events and operating system events. So, the main function of an intrusion detection system is to perform string pattern matching. Memory architecture is a main part of hardware approaches. Through the memory architecture memory pattern is reduced and fast matching is achieved in Network Intrusion Detection System. In this memory architecture, the string patterns are taken as input which is compiled by finite state machine. As a result substrings that match to string patterns are detected. In order to achieve high security as of the networking domain are considered in current scenarios, various methods have been proposed based on the software for pattern matching. But approaches based on software do not provide adequate scalability and reconfigurability to today s level of security provisioning. In order to give enough security in Wireless Intrusion Detection System, this project work moves towards the hardware-based approaches. It provides a high level of security. Hardware based approaches mainly concentrate on memory efficiency in pattern matching. The second phase of this work provides a novel proposed technique, a new algorithm which offers an effectual memory for pattern matc |
Pagination: | xvi,125p. |
URI: | http://hdl.handle.net/10603/345157 |
Appears in Departments: | Faculty of Information and Communication Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 85.46 kB | Adobe PDF | View/Open |
02_certificates.pdf | 1.02 MB | Adobe PDF | View/Open | |
03_vivaproceedings.pdf | 430.41 kB | Adobe PDF | View/Open | |
04_bonafidecertificate.pdf | 85 kB | Adobe PDF | View/Open | |
05_abstracts.pdf | 138.16 kB | Adobe PDF | View/Open | |
06_acknowledgements.pdf | 121.99 kB | Adobe PDF | View/Open | |
07_contents.pdf | 85.63 kB | Adobe PDF | View/Open | |
08_listoftables.pdf | 80.69 kB | Adobe PDF | View/Open | |
09_listoffigures.pdf | 137.76 kB | Adobe PDF | View/Open | |
10_listofabbreviations.pdf | 125.67 kB | Adobe PDF | View/Open | |
11_chapter1.pdf | 471.83 kB | Adobe PDF | View/Open | |
12_chapter2.pdf | 173.1 kB | Adobe PDF | View/Open | |
13_chapter3.pdf | 643.52 kB | Adobe PDF | View/Open | |
14_chapter4.pdf | 467.38 kB | Adobe PDF | View/Open | |
15_chapter5.pdf | 240.71 kB | Adobe PDF | View/Open | |
16_conclusion.pdf | 55.85 kB | Adobe PDF | View/Open | |
17_references.pdf | 169.09 kB | Adobe PDF | View/Open | |
18_listofpublications.pdf | 83.92 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 131.52 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: