Skip to main content

Enhanced Throughput and Accelerated Detection of Network Attacks Using a Membrane Computing Model Implemented on a GPU

  • Chapter
  • First Online:
Advances in Nature-Inspired Computing and Applications

Abstract

Membrane computing (MC) is a versatile, nondeterministic, and maximally parallel computing model. We explore the advantages of MC parallelism to flag intrusive connection records in a set of network traffic using a graphic processing unit (GPU) that built on a parallelism platform with a single-program multiple data (SPMD) feature. We build a P system model for attack detection by combining some of the features of a recognizer P system and a tissue-like P system with symport rules. Most previous implementations for intrusion detection have been performed on sequential or minimally low parallel machines called a central processing unit (CPU), so the issue of large data handling has always been a major challenge. Using a massively parallel NVIDIA CUDA architecture, we were able to overcome this problem. Comparison of processing on a GPU and a CPU reveals an increase in average throughput of 50,000 packets/s and more than fivefold acceleration for the detection rate.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Alomari O, Othman ZA (2012) Bees algorithm for feature selection in network anomaly detection. J Appl Sci Res 8(3):1748–1756

    Google Scholar 

  2. Axelsson S (2000) Intrusion detection systems: a taxonomy and survey. Chalmers University of Technology, Sweden, Tech. Report

    Google Scholar 

  3. Bul’ajoul W, James A, Pannu M (2015) Improving network intrusion detection system performance through quality of service configuration and parallel technology. J Comput Syst Sci 81(6):981–999

    Article  Google Scholar 

  4. Cecilia JM, García JM, Guerrero GD, Martínez–del–Amor MA, Pérez–Hurtado I, Pérez–Jiménez MJ (2009) Implementing P systems parallelism by means of GPUs. In: Membrane computing, Springer, Berlin, pp 227–241

    Google Scholar 

  5. Cecilia JM, García JM, Guerrero GD, Martínez-del-Amor MA, Pérez-Hurtado I, Pérez-Jiménez MJ (2010) Simulating a P system based efficient solution to SAT by using GPUs. J Logic Algebraic Program 79(6):317–325

    Article  MathSciNet  Google Scholar 

  6. Dartigue C, Jang HI, Zeng W (2009) A new data-mining based approach for network intrusion detection. In: Communication Networks and Services Research Conference, 2009. CNSR’09. Seventh Annual, pp 372–377

    Google Scholar 

  7. Díaz-Pernil D, Berciano A, Pena-Cantillana F, Gutierrez-Naranjo MA (2013) Segmenting images with gradient-based edge detection using membrane computing. Pattern Recogn Lett 34(8):846–855

    Article  Google Scholar 

  8. Folorunso O, Akande OO, Ogunde AO, Vincent OR (2010) ID-SOMGA: a self organizing migrating genetic algorithm-based solution for intrusion detection. Comput Inform Sci 3(4):80–92

    Google Scholar 

  9. Ipate F, Dragomir C, Lefticaru R, Mierla L, Pérez-Jiménez MDJ (2012) Using a kernel P system to solve the 3-col problem. In: Proceedings of the 13th international conference on membrane computing. Computer and Automation Research Institute, Hungarian Academy of Sciences, pp 243–258

    Google Scholar 

  10. Ishdorj TO, Leporati A, Pan L, Zeng X, Zhang X (2010) Deterministic solutions to QSAT and Q3SAT by spiking neural P systems with pre-computed resources. Theoret Comput Sci 411(25):2345–2358

    Article  MathSciNet  Google Scholar 

  11. Jiménez MJP, Jiménez ÁR, Caparrini FS (2003) Complexity classes in models of cellular computing with membranes. Nat Comput 2(3):265–285

    Article  MathSciNet  Google Scholar 

  12. Leporati A, Ferretti C (2010) Modeling and analysis of firewalls by (tissue-like) P systems. Rom J Inf Sci Technol 13(2):169–180

    Google Scholar 

  13. Maroosi A, Ravie CM, Elankovan S, Abdullah MZ (2014) Parallel and distributed computing models on a graphics processing unit to accelerate simulation of membrane systems. Simul Model Pract Theory 47:60–78

    Article  Google Scholar 

  14. Martı́ C, Păun G, Pazos J (2003) Tissue P systems. Theoret Comput Sci 296(2):295–326

    Article  MathSciNet  Google Scholar 

  15. Modi C, Patel D, Borisaniya B, Patel H, Patel A, Rajarajan M (2013) A survey of intrusion detection techniques in cloud. J Netw Comput Appl 36(1):42–57

    Article  Google Scholar 

  16. Nvidia (2012) Whitepaper on NVIDIA GeForce GTX 680

    Google Scholar 

  17. Papadogiannakis A, Polychronakis M, Markatos EP (2010) Improving the accuracy of network intrusion detection systems under load using selective packet discarding. In: Proceedings of the third European workshop on system security, pp 15–21

    Google Scholar 

  18. Păun Gh, Rozenberg G (2002) A guide to membrane computing. Theoret Comput Sci 287:73–100

    Article  MathSciNet  Google Scholar 

  19. Păun Gh (2006) “Introduction to membrane computing,” Applications of membrane computing. Springer, Berlin, pp 1–42. ISBN 978-3-540-29937-0

    Google Scholar 

  20. Reese J, Zaranek S (2012) GPU programming in matlab. MathWorks News & Notes. The MathWorks Inc, Natick

    Google Scholar 

  21. Rietz R, Vogel M, Schuster F, König H (2014) Parallelization of network intrusion detection systems under attack conditions. In: Detection of intrusions and malware, and vulnerability assessment. Springer, Berlin, pp 172–191

    Google Scholar 

  22. Rufai KI, Ravie CM, Othman ZA (2014) Improving bee algorithm based feature selection in intrusion detection system using membrane computing. J Netw 9(3):523–529

    Google Scholar 

  23. Schaelicke L, Freeland JC (2005) Characterizing sources and remedies for packet loss in network intrusion detection systems. In Workload characterization symposium, proceedings of the IEEE international, pp 188–196

    Google Scholar 

  24. Shiravi A, Shiravi H, Tavallaee M, Ghorbani AA (2012) Toward developing a systematic approach to generate benchmark datasets for intrusion detection. Comput Secur 31(3):357–374

    Article  Google Scholar 

  25. Uma M, Padmavathi G (2013) A survey on various cyber attacks and their classification. Int J Netw Secur 15(5):390–396

    Google Scholar 

  26. Vasiliadis G, Michalis P, Sotiris I (2011) MIDeA: a multi-parallel intrusion detection architecture. In: Proceedings of the 18th ACM conference on computer and communications security, ACM, pp 297–308

    Google Scholar 

  27. Vasiliadis G, Antonatos S, Michalis P, Markatos EP, Sotiris I (2008) “Gnort: high performance network intrusion detection using graphics processors,” Recent advances in intrusion detection. Springer, Berlin, pp 116–134

    Google Scholar 

  28. Venter HS, Eloff JH (2003) A taxonomy for information security technologies. Comput Secur 22(4):299–307

    Article  Google Scholar 

  29. Wu W, DeMar P, Holmgren D, Singh A (2011) G-NetMon: a GPU-accelerated network performance monitoring system. In: 2011 symposium on application accelerators in high-performance computing (SAAHPC), pp 76–79

    Google Scholar 

  30. Zaher S, Badr A, Farag I, Tarek Elmageed TA (2012) Using P system with GPU model to design and implement a public key cryptography. Int J Compt App 60(6):0975–8887

    Google Scholar 

  31. Zaher S, Badr A, Farag I (2012) Performance enhancement of RSA cryptography algorithm by membrane computing. Int J Adv Res Compt Sci Softw Eng 2(9)

    Google Scholar 

  32. Zhang GX, Cheng JX, Gheorghe M (2011) A membrane-inspired approximate algorithm for traveling salesman problems. Rom J Info Sci Technol 14(1):3–19

    Google Scholar 

  33. Reese J, Zaranek S (2012) GPU programming in Matlab. MathWorks News & Notes. The MathWorks Inc, Natick, MA, pp 22–5

    Google Scholar 

Download references

Acknowledgements

This work has been supported by Fundamental Research Grant of Ministry of Higher Education of Malaysia (Grant Code : FRGS/1/2015/ICT04/UKM/02/3).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ravie Chandren Muniyandi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer International Publishing AG, part of Springer Nature

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Idowu, R.K., Muniyandi, R.C. (2019). Enhanced Throughput and Accelerated Detection of Network Attacks Using a Membrane Computing Model Implemented on a GPU. In: Shandilya, S., Shandilya, S., Nagar, A. (eds) Advances in Nature-Inspired Computing and Applications. EAI/Springer Innovations in Communication and Computing. Springer, Cham. https://doi.org/10.1007/978-3-319-96451-5_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-96451-5_11

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-96450-8

  • Online ISBN: 978-3-319-96451-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics