An FPGA Architecture for ASIC-FPGA Co-design to Streamline Processing of IDSs

作者: Tomoaki Sato , Sorawat Chivapreecha , Phichet Moungnoul , Kohji Higuchi

DOI: 10.1109/CTS.2016.0079

关键词: Computer scienceMobile deviceParallel processing (DSP implementation)AdderPipeline (computing)Word (computer architecture)Embedded systemField-programmable gate arrayGate arrayApplication-specific integrated circuit

摘要: Novel methods for unauthorized access are always made. For cyber security measures in mobile devices, low-power and high-speed processing is very important. Despite these situations, a CPU devices low capacity order to focus on operations does not have sufficient performance detection access. In contrast, field-programmable gate array (FPGA) can apply devices. By using the FPGA, able use parallel processing, super pipeline that independent of word width size. However, FPGA has problem delay times arithmetic circuits longer than an application specific integrated circuit (ASIC) or CPU. this paper, authors propose architecture ASIC-FPGA co-design addressing problem. evaluate architecture, adders enhanced by evaluated. As result, it shown with solved.

参考文章(10)
T. Sato, M. Fukase, Reconfigurable hardware implementation of host-based IDS asia-pacific conference on communications. ,vol. 2, pp. 849- 853 ,(2003) , 10.1109/APCC.2003.1274480
Jema David Ndibwile, A. Govardhan, Kazuya Okada, Youki Kadobayashi, Web Server Protection against Application Layer DDoS Attacks Using Machine Learning and Traffic Authentication computer software and applications conference. ,vol. 3, pp. 261- 267 ,(2015) , 10.1109/COMPSAC.2015.240
Quang Anh Tran, Frank Jiang, JIankun Hu, A Real-Time NetFlow-based Intrusion Detection System with Improved BBNN and High-Frequency Field Programmable Gate Arrays trust security and privacy in computing and communications. pp. 201- 208 ,(2012) , 10.1109/TRUSTCOM.2012.51
Robert Mitchell, Ing-Ray Chen, Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems IEEE Transactions on Reliability. ,vol. 62, pp. 199- 210 ,(2013) , 10.1109/TR.2013.2240891
Muhammad Qasim Ali, Ehab Al-Shaer, Taghrid Samak, Firewall Policy Reconnaissance: Techniques and Analysis IEEE Transactions on Information Forensics and Security. ,vol. 9, pp. 296- 308 ,(2014) , 10.1109/TIFS.2013.2296874
Abhishek Mitra, Walid Najjar, Laxmi Bhuyan, Compiling PCRE to FPGA for accelerating SNORT IDS Proceedings of the 3rd ACM/IEEE Symposium on Architecture for networking and communications systems - ANCS '07. pp. 127- 136 ,(2007) , 10.1145/1323548.1323571
Fu-Yu Wang, Wei-Hsuan Tai, Cheng-Yuan Ho, Yuan-Cheng Lai, I-Wei Chen, Statistical analysis of false positives and false negatives from real traffic with intrusion detection/prevention systems IEEE Communications Magazine. ,vol. 50, pp. 146- 154 ,(2012) , 10.1109/MCOM.2012.6163595
Claude Fachkha, Mourad Debbabi, Darknet as a Source of Cyber Intelligence: Survey, Taxonomy, and Characterization IEEE Communications Surveys and Tutorials. ,vol. 18, pp. 1197- 1227 ,(2016) , 10.1109/COMST.2015.2497690
Andrea Lupia, Floriano De Rango, Trust management using probabilistic energy-aware monitoring for intrusion detection in mobile ad-hoc networks wireless telecommunications symposium. pp. 1- 6 ,(2016) , 10.1109/WTS.2016.7482041
Tomoaki Sato, Sorawat Chivapreecha, Phichet Moungnoul, Kohji Higuchi, RCA on FPGAs designed by the RTL design methodology and wave-pipelined operation international conference on electrical engineering/electronics, computer, telecommunications and information technology. pp. 1- 6 ,(2016) , 10.1109/ECTICON.2016.7561415