@inproceedings{6e80430aa93146b3bcffc0602b79d205,
title = "Framework for a NetFPGA-based snort NIDS",
abstract = "Network's speed continues to increase at a high rate resulting in massive network traffic. This results in a need to have a high-speed network intrusion detection system (NIDS) to detect malicious traffic. Snort is a software-based NIDS that can run as a single threaded application. However, it may not be able to detect intrusions in real-time especially in networks with high traffic. This paper proposes a two layer framework where Snort will run as a second line of defense and will be executed only when deep payload analysis is needed. To accelerate the efficiency of Snort, the proposed system will dynamically offload the most frequent rules or signatures to a NetFPGA based hardware. The NetFPGA will work as a first line of defense that accelerates the detection by filtering all the traffic looking for intrusions. This will be done by analyzing the captured packet header to match the offloaded rules or signatures.",
keywords = "Intrusion detection system, NetFPGA, Network Security, Snort",
author = "Rami Al-Dalky and Khaled Salah and Mahmoud Al-Qutayri and Hadi Otrok",
note = "Publisher Copyright: {\textcopyright} 2014 IEEE.; 2014 9th International Symposium on Communication Systems, Networks and Digital Signal Processing, CSNDSP 2014 ; Conference date: 23-07-2014 Through 25-07-2014",
year = "2014",
month = oct,
day = "14",
doi = "10.1109/CSNDSP.2014.6923858",
language = "British English",
series = "2014 9th International Symposium on Communication Systems, Networks and Digital Signal Processing, CSNDSP 2014",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
pages = "380--383",
booktitle = "2014 9th International Symposium on Communication Systems, Networks and Digital Signal Processing, CSNDSP 2014",
address = "United States",
}