AIセキュリティポータル K Program
Reconfigurable Edge Hardware for Intelligent IDS: Systematic Approach
Share
Abstract
Intrusion detection systems (IDS) are crucial security measures nowadays to enforce network security. Their task is to detect anomalies in network communication and identify, if not thwart, possibly malicious behavior. Recently, machine learning has been deployed to construct intelligent IDS. This approach, however, is quite challenging particularly in distributed, highly dynamic, yet resource-constrained systems like Edge setups. In this paper, we tackle this issue from multiple angles by analyzing the concept of intelligent IDS (I-IDS) while addressing the specific requirements of Edge devices with a special focus on reconfigurability. Then, we introduce a systematic approach to constructing the I-IDS on reconfigurable Edge hardware. For this, we implemented our proposed IDS on state-of-the-art Field Programmable Gate Arrays (FPGAs) technology as (1) a purely FPGA-based dataflow processor (DFP) and (2) a co-designed approach featuring RISC-V soft-core as FPGA-based soft-core processor (SCP). We complete our paper with a comparison of the state of the art (SoA) in this domain. The results show that DFP and SCP are both suitable for Edge applications from hardware resource and energy efficiency perspectives. Our proposed DFP solution clearly outperforms the SoA and demonstrates that required high performance can be achieved without prohibitively high hardware costs. This makes our proposed DFP suitable for Edge-based high-speed applications like modern communication technology.
Chipyard: Integrated design, simulation, and implementation framework for custom SoCs
A. Amid, D. Biancolin, A. Gonzalez, D. Grubb, S. Karandikar, H. Liew, A. Magyar, H. Mao, A. Ou, N. Pemberton, P. Rigge, C. Schmidt, J. Wright, J. Zhao, Y. S. Shao, K. Asanovic, B. Nikolic
Published: 2020
The rocket chip generator
K. Asanovi´c, R. Avizienis, J. Bachrach, S. Beamer, D. Biancolin, C. Celio, H. Cook, D. Dabbelt, J. Hauser, A. Izraelevitz, S. Karandikar, B. Keller, D. Kim, J. Koenig, Y. Lee, E. Love, M. Maas, A. Magyar, H. Mao, M. Moreto, A. Ou, D.A. Patterson, B. Richards, C. Schmidt, S. Twigg, H. Vo, A. Waterman
Published: 2016
Reconfigurable fpga architectures: A survey and applications
P. Babu, E. Parthasarathy
Published: 2021
Application of svm and ann for intrusion detection
W.H. Chen, S.H. Hsu, H.P. Shen
Published: 2005
An intrusion-detection model
D.E. Denning
Published: 1987
Performance analysis of machine learning models for intrusion detection system using gini impurity-based weighted random forest (giwrf) feature selection technique
R.A. Disha, S. Waheed
Published: 2022
Network intrusion detection using neural networks on fpga socs
L. Ioannou, S.A. Fahmy
Published: 2019
A network intrusion detection system based on a hidden naïve bayes multiclass classifier
L. Koc, T.A. Mazzuchi, S. Sarkani
Published: 2012
Towards the Development of Realistic Botnet Dataset in the Internet of Things for Network Forensic Analytics: Bot-IoT Dataset
Nickolaos Koroniotis, Nour Moustafa, Elena Sitnikova, Benjamin Turnbull
Published: 11.2.2018
Measuring the gap between fpgas and asics
I. Kuon, J. Rose
Published: 2006
Towards real-time deep learning-based network intrusion detection on fpga
L. Le Jeune, T. Goedem´e, N. Mentens
Published: 2021
Unsw-nb15: a comprehensive data set for network intrusion detection systems (unsw-nb15 network data set)
N. Moustafa, J. Slay
Published: 2015
Introduction to machine learning with Python: a guide for data scientists
A.C. M¨uller, S. Guido
Published: 2016
High-throughput machine learning approaches for network attacks detection on fpga
D.M. Ngo, B. Tran-Thanh, T. Dang, T. Tran, T.N. Thinh, C. Pham-Quoc
Published: 2019
A survey of edge computing-based designs for iot security
K. Sha, T.A. Yang, W. Wei, S. Davari
Published: 2020
Toward generating a new intrusion detection dataset and intrusion traffic characterization
Iman Sharafaldin, Arash Habibi Lashkari, Ali A Ghorbani
Published: 2018
Logicnets: Co-designed neural networks and circuits for extreme-throughput applications
Y. Umuroglu, Y. Akhauri, N. J. Fraser, M. Blott
Published: 2020
Taxonomy and survey of collaborative intrusion detection
E. Vasilomanolakis, S. Karuppayah, M. M¨uhlh¨auser, M. Fischer
Published: 2015
Share