The NADIA: A Network Acceleration System with Defense against Network Invasion and Attack
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kim, Sunwook | - |
dc.contributor.author | Kim, Byunggu | - |
dc.contributor.author | Kim, Seongwoon | - |
dc.contributor.author | Park, Jinwon | - |
dc.contributor.author | Chung, Yongwha | - |
dc.date.accessioned | 2021-09-06T16:12:41Z | - |
dc.date.available | 2021-09-06T16:12:41Z | - |
dc.date.created | 2021-06-18 | - |
dc.date.issued | 2012-09 | - |
dc.identifier.issn | 0377-2063 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/107620 | - |
dc.description.abstract | Information security plays a critical role in the design of high-speed network systems, and much attention is focused on the Network Intrusion Prevention System (NIPS) which combines both a firewall and a Network Intrusion Detection System (NIDS). However, the current generation of NIDS/NIPS has several limitations on performance and effectiveness. In this paper, we describe the Network Accelerator with Defense against Invasion and Attack (NADIA) architecture as a network security card. The NADIA system consists of NADIA hardware for network and security processing and NADIA software for a device driver and a management agent. The goal of the network acceleration hardware is to reduce the overhead of the host CPU for network processing. And, the security function hardware performs operations such as network ACL, DPI, DDoS blocking, and session control, in order to check whether the received packets are malicious or not. Based on the performance evaluation, we can confirm that NADIA can reduce the CPU overhead of the network and security processing by a factor of 5 similar to 14. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | TAYLOR & FRANCIS LTD | - |
dc.title | The NADIA: A Network Acceleration System with Defense against Network Invasion and Attack | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Chung, Yongwha | - |
dc.identifier.doi | 10.4103/0377-2063.104158 | - |
dc.identifier.scopusid | 2-s2.0-84876352071 | - |
dc.identifier.wosid | 000317435100008 | - |
dc.identifier.bibliographicCitation | IETE JOURNAL OF RESEARCH, v.58, no.5, pp.398 - 410 | - |
dc.relation.isPartOf | IETE JOURNAL OF RESEARCH | - |
dc.citation.title | IETE JOURNAL OF RESEARCH | - |
dc.citation.volume | 58 | - |
dc.citation.number | 5 | - |
dc.citation.startPage | 398 | - |
dc.citation.endPage | 410 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Engineering | - |
dc.relation.journalResearchArea | Telecommunications | - |
dc.relation.journalWebOfScienceCategory | Engineering, Electrical & Electronic | - |
dc.relation.journalWebOfScienceCategory | Telecommunications | - |
dc.subject.keywordAuthor | DDoS | - |
dc.subject.keywordAuthor | Gigabit | - |
dc.subject.keywordAuthor | Home network | - |
dc.subject.keywordAuthor | Network offloading | - |
dc.subject.keywordAuthor | Network intrusion detection system | - |
dc.subject.keywordAuthor | Network intrusion prevention system | - |
dc.subject.keywordAuthor | Snort rule | - |
dc.subject.keywordAuthor | TCP | - |
dc.subject.keywordAuthor | IP overhead | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(02841) 서울특별시 성북구 안암로 14502-3290-1114
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.