You are not logged in.

Using multi-core processors to support network security applications

Xiang, Yang and Zhou, Wanlei 2008, Using multi-core processors to support network security applications, in Proceedings of the IEEE Computer Society Workshop on Future Trends of Distributed Computing Systems, IEEE, Piscataway, N.J., pp. 213-218, doi: 10.1109/FTDCS.2008.16.

Attached Files
Name Description MIMEType Size Downloads

Title Using multi-core processors to support network security applications
Author(s) Xiang, Yang
Zhou, WanleiORCID iD for Zhou, Wanlei orcid.org/0000-0002-1680-2521
Conference name IEEE International Workshop on Future Trends of Distributed Computing System
Conference location Pheonix, AZ
Conference dates 21-23 Oct. 2008
Title of proceedings Proceedings of the IEEE Computer Society Workshop on Future Trends of Distributed Computing Systems
Publication date 2008
Start page 213
End page 218
Total pages 6
Publisher IEEE
Place of publication Piscataway, N.J.
Summary Multi-core processors represent a major evolution in computing hardware technology. Multi-core provides a network security application with more processing power from the hardware perspective. However, there are still significant software design challenges that must be overcome. In this paper, we present new architecture for multi-core supported network security applications, which aims at providing network security processing without causing performance penalty to normal network operations. We also provide an instance of this architecture - a multi-core supported intrusion detection system based on neural network. While hardware-based parallelisms have shown their advantage on throughput performance, parallelisms based multi-core provides more flexible, high performance, comprehensive, intelligent, and scalable solutions to network security applications. © 2008 IEEE.
Language eng
DOI 10.1109/FTDCS.2008.16
Field of Research 080303 Computer System Security
Socio Economic Objective 970108 Expanding Knowledge in the Information and Computing Sciences
HERDC Research category E1.1 Full written paper - refereed
ERA Research output type E Conference publication
Copyright notice ©2009, IEEE
Persistent URL http://hdl.handle.net/10536/DRO/DU:30077756

Document type: Conference Paper
Collection: School of Information Technology
Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Versions
Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 0 times in TR Web of Science
Scopus Citation Count Cited 7 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 104 Abstract Views, 1 File Downloads  -  Detailed Statistics
Created: Tue, 26 Apr 2016, 15:28:07 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.