32
Views
0
CrossRef citations to date
0
Altmetric
Original Articles

The NADIA: A Network Acceleration System with Defense against Network Invasion and Attack

, , , &
Pages 398-410 | Published online: 01 Sep 2014

References

  • W Feng, J Hurwitz, H Newman, S Ravot, R Les Cottrell, and O Martin, et al., “Optimizing 10-Gigabit Ethernet for Networks of Workstations, Clusters, and Grids: A Case Study,” Proc. of 2003 ACM/IEEE Conf. on Supercomputing, pp.50–63, Nov. 2003.
  • J Hurwitz, and W Feng, “End-to-end Performance of 10-gigabit Ethernet on Commodity Systems,” IEEE Micro, Vol. 24, no. 1, pp. 10–22, 2004.
  • G Regnier, S Makineni, R Illikkal, R Iyer, D Minturn, and R Huggaballi, et al., “TCP Onloading for Data Center Servers,” IEEE Computer, Vol.37, no. 11, pp. 46–56, 2004.
  • N Binkert, L Hsu, A Saidi, R Dreslinski, A Schultz, and S Reinhardt, et al., “Performance Analysis of System Overheads in TCP/IP Workloads,” Proc. of the 14th international Conference on Parallel Architectures and Compilation Techniques, pp.218–30, Sept. 2005.
  • K Park, S Oh, S Kim, and Y Chung, “A Network I/O Architecture for Terminal-Initiated Traffics in a Ubiquitous Service Server,” LNCS, 2008, Vol.5200/2008, pp. 161–70, 2008.
  • W Stallings, and L Brown, “Computer Security”, Upper Saddle River, New Jersey: Pearson Education; pp.10–22, 2008.
  • H Cho, D Kim, J Kim, Y Doh, and J Jang, “Network Processor based Network Intrusion Detection System,” LNCS, 2004, Vol.3090/2004, pp. 973–82, 2004.
  • L Roberts, “Beyond Moore’s Law: Internet Growth Trends,” IEEE Computer, Vol.33, no.1, pp. 117–9, Jan. 2000.
  • C Clark, W Lee, D Schimmel, D Contis, M Kone, and A Thomas, “A Hardware Platform for Network Intrusion Detection and Prevention,” Proc. of Third Workshop on Network Processors and Applications(NP3), Vol. 3, pp.99–118, Feb. 2004.
  • M Otey, S Parthasarathy, A Ghoting, G Li, S Narravula, and D Panda, “Towards NIC-based Intrusion Detection,” Proc. of the ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp.723–8, Aug. 2003.
  • “Network Security- NIC Based Intrusion Detection Systems,” Internet white papers, ftxonline, available from: http://www.ftxonline.com/ network-security--nic-based.html, [Last accessed in 2012].
  • W de Bruijn, A Slowinska, K van Reeuwijk, T Hruby, L Xu, and H Bos, “SafeCard: A Gigabit IPS on the Network Card,” Proc of the 8th International Symposium on Recent Advances in Intrusion Detection(RAID), Vol.4219, pp.311–30, Sept. 2006.
  • M Roesch, and C Green, “Snort Users Manual,“ Internet white papers, SourceFire, INC, available from: http://www.snort.org [Last accessed on 2011].
  • H Bos, and K Huang, “Towards Software-based Signature Detection for Intrusion Prevention on the Network Card,” Proc of the 8th International Symposium on Recent Advances in Intrusion Detection(RAID), Vol. 3858, pp.102–23, Sept. 2005.
  • S Singh, C Estan, G Varghese, and S Savage, “Automated Worm Fingerprinting,” Proc. of the 6th Conference on Symposium on Operating Systems Design and Implementation(OSDI), Vol.6, pp. 45–60, Dec. 2004.
  • T Ptacek, and T Newsham, “Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection,” Technical report, Secure Networks Inc., pp.1–63, Jan. 1998.
  • LSO, Available from: http://en.wikipedia.org/wiki/Large_segment offload [Last accessed on 12012].
  • PCI Express Base Specification Rev 1.1, PCI-SIG.
  • W Stevens, “TCP/IP Illustrated Volume I: The Protocols”, United States: Addison Wesley; 1994.
  • Snort Rules, available from: http://www.snort.org/snort-rules [Last accessed on 2012].
  • J Corbet, A Rubini, and G Kroah-Hartman, “Linux Device Drivers”, 3rd Edn, Sebastopol, CA, United States of America: O’Reilly; 2005.
  • Virtex-5 LX85T FPGA, available from: http://www.xilinx.com / support/documentation/virtex-5.htm. [Last accessed in 2011]
  • Virtex-5 FPGA Embedded Tri-Mode Ethernet MAC User Guide, Xilinx doc., 2008.
  • Mplayer-The Movie Player, Available from: http://www.mplayerhq. hu/ [Last accessed on 2012]
  • SYN cookies, Available from: http://en.wikipedia.org/wiki/SYN_ cookies [Last accessed on 2012].
  • Sniph, “Snot,“ Available from: http://www.sec33.com/sniph/, [Last accessed in 2001].
  • S Makineni, R Iyer, P Sarangam, D Newell, L Zhao, and R Illikkal, “Receive Side Coalescing for Accelerating TCP/IP Processing,” Proc. of High Performance Computing(HiPC), Vol.4297 pp. 289–300, Dec. 2006.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.