Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

The NADIA: A Network Acceleration System with Defense against Network Invasion and Attack

Full metadata record
DC Field Value Language
dc.contributor.authorKim, Sunwook-
dc.contributor.authorKim, Byunggu-
dc.contributor.authorKim, Seongwoon-
dc.contributor.authorPark, Jinwon-
dc.contributor.authorChung, Yongwha-
dc.date.accessioned2021-09-06T16:12:41Z-
dc.date.available2021-09-06T16:12:41Z-
dc.date.created2021-06-18-
dc.date.issued2012-09-
dc.identifier.issn0377-2063-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/107620-
dc.description.abstractInformation security plays a critical role in the design of high-speed network systems, and much attention is focused on the Network Intrusion Prevention System (NIPS) which combines both a firewall and a Network Intrusion Detection System (NIDS). However, the current generation of NIDS/NIPS has several limitations on performance and effectiveness. In this paper, we describe the Network Accelerator with Defense against Invasion and Attack (NADIA) architecture as a network security card. The NADIA system consists of NADIA hardware for network and security processing and NADIA software for a device driver and a management agent. The goal of the network acceleration hardware is to reduce the overhead of the host CPU for network processing. And, the security function hardware performs operations such as network ACL, DPI, DDoS blocking, and session control, in order to check whether the received packets are malicious or not. Based on the performance evaluation, we can confirm that NADIA can reduce the CPU overhead of the network and security processing by a factor of 5 similar to 14.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherTAYLOR & FRANCIS LTD-
dc.titleThe NADIA: A Network Acceleration System with Defense against Network Invasion and Attack-
dc.typeArticle-
dc.contributor.affiliatedAuthorChung, Yongwha-
dc.identifier.doi10.4103/0377-2063.104158-
dc.identifier.scopusid2-s2.0-84876352071-
dc.identifier.wosid000317435100008-
dc.identifier.bibliographicCitationIETE JOURNAL OF RESEARCH, v.58, no.5, pp.398 - 410-
dc.relation.isPartOfIETE JOURNAL OF RESEARCH-
dc.citation.titleIETE JOURNAL OF RESEARCH-
dc.citation.volume58-
dc.citation.number5-
dc.citation.startPage398-
dc.citation.endPage410-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaEngineering-
dc.relation.journalResearchAreaTelecommunications-
dc.relation.journalWebOfScienceCategoryEngineering, Electrical & Electronic-
dc.relation.journalWebOfScienceCategoryTelecommunications-
dc.subject.keywordAuthorDDoS-
dc.subject.keywordAuthorGigabit-
dc.subject.keywordAuthorHome network-
dc.subject.keywordAuthorNetwork offloading-
dc.subject.keywordAuthorNetwork intrusion detection system-
dc.subject.keywordAuthorNetwork intrusion prevention system-
dc.subject.keywordAuthorSnort rule-
dc.subject.keywordAuthorTCP-
dc.subject.keywordAuthorIP overhead-
Files in This Item
There are no files associated with this item.
Appears in
Collections
Graduate School > Department of Computer and Information Science > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Chung, Yong wha photo

Chung, Yong wha
컴퓨터정보학과
Read more

Altmetrics

Total Views & Downloads

BROWSE