Abstract
With the thriving technology and the great increase in the usage of computer networks, the risk of having these network to be under attacks have been increased. Number of techniques have been created and designed to help in detecting and/or preventing such attacks. One common technique is the use of Intrusion Detection Systems (IDS). Today, number of open sources and commercial IDS are available to match enterprises requirements. However, the performance of these systems is still the main concern. This paper examines perceptions of intrusion detection architecture implementation, resulting from the use of graphics processor. It discusses recent research activities, developments and problems of operating systems security. Some exploratory evidence is presented that shows capabilities of using graphical processors and intrusion detection systems. The focus is on how knowledge experienced throughout the graphics processor inclusion has played out in the design of intrusion detection architecture that is seen as an opportunity to strengthen research expertise.
Highlights
This work advocates intrusion detection architecture with the use of graphics processors, which is closely associated with the issue of computer systems security
The goal of this work is to propose intrusion detection architecture with the use of graphics processors which can further lead to the provision of an active safety system for the particular network and operating system
The Graphical User Interface (GUI) provides a better overview of the network traffic and alerts, which are generated by the Intrusion Detection Systems (IDS)
Summary
This work advocates intrusion detection architecture with the use of graphics processors, which is closely associated with the issue of computer systems security. As evidenced by an extant literature base, Intrusion Detection Systems (IDS) are becoming one of the essential components in any organization's network, and are designed to detect any intrusion or hostile traffic in a network [1]. With the serious need of such detection systems organizations have been investing to produce a more effective IDS. In order to reduce this risk, it is necessary to analyse these data. This is a critical issue as common processors do not always provide enough power to do so [8]
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.