IDEAS home Printed from https://ideas.repec.org/a/prg/jnlaip/v2012y2012i1id5p50-59.html
   My bibliography  Save this article

Intrusion Detection Architecture Utilizing Graphics Processors

Author

Listed:
  • Liberios Vokorokos
  • Anton Baláž
  • Branislav Madoš

Abstract

With the thriving technology and the great increase in the usage of computer networks, the risk of having these network to be under attacks have been increased. Number of techniques have been created and designed to help in detecting and/or preventing such attacks. One common technique is the use of Intrusion Detection Systems (IDS). Today, number of open sources and commercial IDS are available to match enterprises requirements. However, the performance of these systems is still the main concern. This paper examines perceptions of intrusion detection architecture implementation, resulting from the use of graphics processor. It discusses recent research activities, developments and problems of operating systems security. Some exploratory evidence is presented that shows capabilities of using graphical processors and intrusion detection systems. The focus is on how knowledge experienced throughout the graphics processor inclusion has played out in the design of intrusion detection architecture that is seen as an opportunity to strengthen research expertise.

Suggested Citation

  • Liberios Vokorokos & Anton Baláž & Branislav Madoš, 2012. "Intrusion Detection Architecture Utilizing Graphics Processors," Acta Informatica Pragensia, Prague University of Economics and Business, vol. 2012(1), pages 50-59.
  • Handle: RePEc:prg:jnlaip:v:2012:y:2012:i:1:id:5:p:50-59
    DOI: 10.18267/j.aip.5
    as

    Download full text from publisher

    File URL: http://aip.vse.cz/doi/10.18267/j.aip.5.html
    Download Restriction: free of charge

    File URL: http://aip.vse.cz/doi/10.18267/j.aip.5.pdf
    Download Restriction: free of charge

    File URL: https://libkey.io/10.18267/j.aip.5?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Libor Měsíček, 2015. "Context Sources and their Processing in Company Security," Acta Informatica Pragensia, Prague University of Economics and Business, vol. 2015(1), pages 44-51.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:prg:jnlaip:v:2012:y:2012:i:1:id:5:p:50-59. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Stanislav Vojir (email available below). General contact details of provider: https://edirc.repec.org/data/uevsecz.html .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.