Abstract
Membrane computing (MC) is a versatile, nondeterministic, and maximally parallel computing model. We explore the advantages of MC parallelism to flag intrusive connection records in a set of network traffic using a graphic processing unit (GPU) that built on a parallelism platform with a single-program multiple data (SPMD) feature. We build a P system model for attack detection by combining some of the features of a recognizer P system and a tissue-like P system with symport rules. Most previous implementations for intrusion detection have been performed on sequential or minimally low parallel machines called a central processing unit (CPU), so the issue of large data handling has always been a major challenge. Using a massively parallel NVIDIA CUDA architecture, we were able to overcome this problem. Comparison of processing on a GPU and a CPU reveals an increase in average throughput of 50,000 packets/s and more than fivefold acceleration for the detection rate.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Alomari O, Othman ZA (2012) Bees algorithm for feature selection in network anomaly detection. J Appl Sci Res 8(3):1748–1756
Axelsson S (2000) Intrusion detection systems: a taxonomy and survey. Chalmers University of Technology, Sweden, Tech. Report
Bul’ajoul W, James A, Pannu M (2015) Improving network intrusion detection system performance through quality of service configuration and parallel technology. J Comput Syst Sci 81(6):981–999
Cecilia JM, García JM, Guerrero GD, Martínez–del–Amor MA, Pérez–Hurtado I, Pérez–Jiménez MJ (2009) Implementing P systems parallelism by means of GPUs. In: Membrane computing, Springer, Berlin, pp 227–241
Cecilia JM, García JM, Guerrero GD, Martínez-del-Amor MA, Pérez-Hurtado I, Pérez-Jiménez MJ (2010) Simulating a P system based efficient solution to SAT by using GPUs. J Logic Algebraic Program 79(6):317–325
Dartigue C, Jang HI, Zeng W (2009) A new data-mining based approach for network intrusion detection. In: Communication Networks and Services Research Conference, 2009. CNSR’09. Seventh Annual, pp 372–377
Díaz-Pernil D, Berciano A, Pena-Cantillana F, Gutierrez-Naranjo MA (2013) Segmenting images with gradient-based edge detection using membrane computing. Pattern Recogn Lett 34(8):846–855
Folorunso O, Akande OO, Ogunde AO, Vincent OR (2010) ID-SOMGA: a self organizing migrating genetic algorithm-based solution for intrusion detection. Comput Inform Sci 3(4):80–92
Ipate F, Dragomir C, Lefticaru R, Mierla L, Pérez-Jiménez MDJ (2012) Using a kernel P system to solve the 3-col problem. In: Proceedings of the 13th international conference on membrane computing. Computer and Automation Research Institute, Hungarian Academy of Sciences, pp 243–258
Ishdorj TO, Leporati A, Pan L, Zeng X, Zhang X (2010) Deterministic solutions to QSAT and Q3SAT by spiking neural P systems with pre-computed resources. Theoret Comput Sci 411(25):2345–2358
Jiménez MJP, Jiménez ÁR, Caparrini FS (2003) Complexity classes in models of cellular computing with membranes. Nat Comput 2(3):265–285
Leporati A, Ferretti C (2010) Modeling and analysis of firewalls by (tissue-like) P systems. Rom J Inf Sci Technol 13(2):169–180
Maroosi A, Ravie CM, Elankovan S, Abdullah MZ (2014) Parallel and distributed computing models on a graphics processing unit to accelerate simulation of membrane systems. Simul Model Pract Theory 47:60–78
Martı́ C, Păun G, Pazos J (2003) Tissue P systems. Theoret Comput Sci 296(2):295–326
Modi C, Patel D, Borisaniya B, Patel H, Patel A, Rajarajan M (2013) A survey of intrusion detection techniques in cloud. J Netw Comput Appl 36(1):42–57
Nvidia (2012) Whitepaper on NVIDIA GeForce GTX 680
Papadogiannakis A, Polychronakis M, Markatos EP (2010) Improving the accuracy of network intrusion detection systems under load using selective packet discarding. In: Proceedings of the third European workshop on system security, pp 15–21
Păun Gh, Rozenberg G (2002) A guide to membrane computing. Theoret Comput Sci 287:73–100
Păun Gh (2006) “Introduction to membrane computing,” Applications of membrane computing. Springer, Berlin, pp 1–42. ISBN 978-3-540-29937-0
Reese J, Zaranek S (2012) GPU programming in matlab. MathWorks News & Notes. The MathWorks Inc, Natick
Rietz R, Vogel M, Schuster F, König H (2014) Parallelization of network intrusion detection systems under attack conditions. In: Detection of intrusions and malware, and vulnerability assessment. Springer, Berlin, pp 172–191
Rufai KI, Ravie CM, Othman ZA (2014) Improving bee algorithm based feature selection in intrusion detection system using membrane computing. J Netw 9(3):523–529
Schaelicke L, Freeland JC (2005) Characterizing sources and remedies for packet loss in network intrusion detection systems. In Workload characterization symposium, proceedings of the IEEE international, pp 188–196
Shiravi A, Shiravi H, Tavallaee M, Ghorbani AA (2012) Toward developing a systematic approach to generate benchmark datasets for intrusion detection. Comput Secur 31(3):357–374
Uma M, Padmavathi G (2013) A survey on various cyber attacks and their classification. Int J Netw Secur 15(5):390–396
Vasiliadis G, Michalis P, Sotiris I (2011) MIDeA: a multi-parallel intrusion detection architecture. In: Proceedings of the 18th ACM conference on computer and communications security, ACM, pp 297–308
Vasiliadis G, Antonatos S, Michalis P, Markatos EP, Sotiris I (2008) “Gnort: high performance network intrusion detection using graphics processors,” Recent advances in intrusion detection. Springer, Berlin, pp 116–134
Venter HS, Eloff JH (2003) A taxonomy for information security technologies. Comput Secur 22(4):299–307
Wu W, DeMar P, Holmgren D, Singh A (2011) G-NetMon: a GPU-accelerated network performance monitoring system. In: 2011 symposium on application accelerators in high-performance computing (SAAHPC), pp 76–79
Zaher S, Badr A, Farag I, Tarek Elmageed TA (2012) Using P system with GPU model to design and implement a public key cryptography. Int J Compt App 60(6):0975–8887
Zaher S, Badr A, Farag I (2012) Performance enhancement of RSA cryptography algorithm by membrane computing. Int J Adv Res Compt Sci Softw Eng 2(9)
Zhang GX, Cheng JX, Gheorghe M (2011) A membrane-inspired approximate algorithm for traveling salesman problems. Rom J Info Sci Technol 14(1):3–19
Reese J, Zaranek S (2012) GPU programming in Matlab. MathWorks News & Notes. The MathWorks Inc, Natick, MA, pp 22–5
Acknowledgements
This work has been supported by Fundamental Research Grant of Ministry of Higher Education of Malaysia (Grant Code : FRGS/1/2015/ICT04/UKM/02/3).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer International Publishing AG, part of Springer Nature
About this chapter
Cite this chapter
Idowu, R.K., Muniyandi, R.C. (2019). Enhanced Throughput and Accelerated Detection of Network Attacks Using a Membrane Computing Model Implemented on a GPU. In: Shandilya, S., Shandilya, S., Nagar, A. (eds) Advances in Nature-Inspired Computing and Applications. EAI/Springer Innovations in Communication and Computing. Springer, Cham. https://doi.org/10.1007/978-3-319-96451-5_11
Download citation
DOI: https://doi.org/10.1007/978-3-319-96451-5_11
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-96450-8
Online ISBN: 978-3-319-96451-5
eBook Packages: EngineeringEngineering (R0)