Institute of Computing Technology, Chinese Academy IR
Parallel optimization technology for backbone network intrusion detection system | |
Sun, XJ; Zhou, XL; Sun, NH; Chen, MY | |
2005 | |
发表期刊 | COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS |
ISSN | 0302-9743 |
卷号 | 3802页码:322-327 |
摘要 | Network intrusion detection system (NIDS) is an active field of research. With the rapidly increasing network speed, the capability of the NIDS sensors limits the ability of the system. The problem is more serious for the backbone network intrusion detection system (BNIDS). In this paper, we apply parallel optimization technologies to BNIDS using 4-way SMP server as the target system. After analyzing and testing the defects of the existed system in common use, the optimization policies of using fine-grained schedule mechanism at connection level and avoiding lock operations in thread synchronization are issued for the improved system. Through performance evaluation, the improved system shows more than 25 percent improvement in CPU utilization rate compared with the existed system, and good scalability. |
收录类别 | SCI |
语种 | 英语 |
WOS研究方向 | Computer Science |
WOS类目 | Computer Science, Artificial Intelligence ; Computer Science, Information Systems ; Computer Science, Theory & Methods |
WOS记录号 | WOS:000234874900048 |
出版者 | SPRINGER-VERLAG BERLIN |
引用统计 | |
文献类型 | 期刊论文 |
条目标识符 | http://119.78.100.204/handle/2XEOYT63/10030 |
专题 | 中国科学院计算技术研究所期刊论文_英文 |
通讯作者 | Sun, XJ |
作者单位 | Chinese Acad Sci, Inst Comp Technol, Natl Res Ctr Intelligent Comp Syst, Beijing 100080, Peoples R China |
推荐引用方式 GB/T 7714 | Sun, XJ,Zhou, XL,Sun, NH,et al. Parallel optimization technology for backbone network intrusion detection system[J]. COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS,2005,3802:322-327. |
APA | Sun, XJ,Zhou, XL,Sun, NH,&Chen, MY.(2005).Parallel optimization technology for backbone network intrusion detection system.COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS,3802,322-327. |
MLA | Sun, XJ,et al."Parallel optimization technology for backbone network intrusion detection system".COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS 3802(2005):322-327. |
条目包含的文件 | 条目无相关文件。 |
除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。
修改评论