• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    FPGA-Based Network Traffic Security: Design and Implementation Using C5.0 Decision Tree Classifier

    2013-11-26 11:49:46TarekSalahSobhandMohamedIbrahiemAmer

    Tarek Salah Sobh and Mohamed Ibrahiem Amer

    1.Introduction

    Intrusion detection is still an open area for researchers.Building a network based intrusion detection system(NBIDS) requires abilities to monitor, mange, and process a millions of packets in a very short-time interval[1],[2].These packets have various formats, different hosts with different operating systems and variable lengths of data.This high variance in format, length, and content needs real-time,intelligent, and accurate systems to deal with, at the mean while these systems should be itself secure and reliable.The software, intrusion detection system (IDS), has many drawbacks in the field of NBIDS[1],[2].

    Security of software systems is a function in the security of the hosting system.Performance of software systems has many limitations especially when dealing with a high data bursts (lots of data in short time).Software usually fails at very high traffic conditions.Network traffic is a millions of packets passing in and out of the network in very short periods that needs a dedicated, real-time, reliable,highly available, and secure appliance having intrusion detection as its only task.This work focuses on the design and implementation of hardware network based intrusion detection system using field programmable gate array(FPGA) technology as a core to the system[3]–[5].We elaborated the implementation and the use of hardware appliance in network security.The novel FPGA was implemented for packet processing and connection monitor,aiming finally to implement on chip.The proposed implementation provides a new potential, which can further lead to better performances and more reliable security systems to overcome many speed drawbacks.

    The rest of the paper is organized as follows.Section 2 gives a background on Media Independent Interface IEEE Standard 802.3 Clause 22.Section 3 explains the proposed model.Section 4 describes the implementation details of the proposed model.Section 5 presents the function of TCP/IP stack and its implementation.Section 6 introduces C5.0 model using SPSS Clementine.Section 7 presents the performance evaluation results of this work while.Section 8 gives an end-to-end delay comparative study between software-based IDS and hardware-based IDS.Finally, the conclusions and future directions are drawn in Section 9.

    2.Media Independent Interface IEEE Standard 802.3 Clause 22

    Media independent interface (MII) concerns with 100 Mbps fast Ethernet for describing its functions and specifications[6].This clause defines the logical, electrical,and mechanical characteristics for the reconciliation sublayer (RS) and MII between carrier sense multiple access/collision detect (CSMA/CD) media access controllers and various physical layers (PHYs).Fig.1 shows the location of MII relative to the ISO/OSI reference model.

    Fig.1.MII relationship to the ISO/OSI reference model.

    Fig.2.System block diagram.

    The purpose of this interface is to provide a simple,inexpensive, and easy-to-implement interconnection between media access control (MAC) sub-layers and PHYs for data transfer at 10 Mb/s and 100 Mb/s, and between station management (STA) and PHY entities supporting data transfer at 10 Mb/s or above.

    MII can support two specific data rates, 10 Mb/s and 100 Mb/s.The functionality is identical at both data rates,so are the signal timing relationships.

    3.Proposed Model

    FPGA hardware is used as a platform to perform high speed packet processing and connection monitor, aiming finally to implement on-chip IDS to be placed at the edge of protected network for providing high performance requirements[7]–[9].

    This system must have a parallel processing and intelligence as main basic features.Fig.2 represents the hardware realization of the solutions for implementing the proposed hardware IDS.The proposed system as shown is symmetric around the inference engine from the point of view of the inbound traffic and outbound traffic.The system consists of the following main components.

    1) Network interface: its main function is to carry out all the physical layer signaling and protocols that firstly collect the datagram frames from the communication media.This component exists at the face of both interfaces inbound and outbound.

    2) Feature extractor: its main function is to extract the layer 2, 3 and four of the collected traffic by the network interface.This component also exists at the face of both inbound and outbound.If the traffic passes through the inbound and outbound extractor simultaneously, there is no difference between their detection results.

    3) Attacks database: it carries all patterns and features of attacks.These patterns are used to train the inference engine.This component exists once only for the inference engine.

    4) Detection inference engine: this is the intelligent component in the system, receiving and classifying the extracted features by the feature extractor component, and then finally taking decision about this traffic if it is either normal or attack.This decision can further be introduced to prevention module that has the capability of blocking or forwarding the traffic to the other party (inbound or outbound).

    5) Prevention module: the prevention module is a gateway of inbound and outbound traffic, forwarding or blocking the traffic.

    4.Minimum Hardware Requirements to Implement the Proposed System

    The proposed system must meet the following minimum requirements to implement our design.

    1) Support MII interface for interfacing with network.

    2) Clock with 133 MHz frequency or higher.

    3) Memory (RAM) with minimum capacity of 2 Kbit or higher.

    4) Two or more MII Ethernet interfaces (one is enough but the board in this case must has at least 12 bit-expansion slots to connect to any other external MII Ethernet interfaces).

    Xilinx has released the Spartan-3A/3AN board, which is the most suitable toolkit for implementing our design.Spartan-3A/3AN can meet the minimum hardware requirements of systems[10].

    5.Implementation Details of the Proposed Model

    Fig.3 represents the implementation of the proposed model using FPGA.The DeMilitarized Zone (DMZ)network in the model represents the trusted network to be protected; the wide area network (WAN) represents the untrusted external network.The DMZ and WAN share inbound and outbound traffic that is generated by DMZ and to be transmitted to WAN is outbound traffic from DMZ point of view and inbound traffic from WAN point of view and vice versus.

    Fig.3.Implementation of proposed system.

    5.1 Cross Connector

    The functions of the cross connector is to implement MII interface to both DMZ or WAN: pass traffic in both directions without adding significant delay by connecting transmitter of DMZ traffic to receiver of WAN traffic and VSS (vNetwork standard switch); introduce traffic to TCP/IP stack for start processing, and synchronize data flow between two network interfaces (two MII interfaces).Finally, the cross connector, using TCP/IP stack, can be used in the future with prevention module to block or pass traffic by raising error flag signals (MII TX ERR or RX ERR).This process receives the input from both directions of the flows.WAN-RXD is connected to DMZ-TXD and DMZ-RXD is connected to WAN-TXD, also WAN-RX DV to DMZ-TX EN and DMZ-RX DV to WAN-TX EN.The connection between the transmitters of one stream to the receiver of the other has many problems as following.

    1) Synchronization problem: each MII interface works independently of the other and has its own asynchronous clock.

    2) Propagation delay: the signal transmitted from one card takes a propagation delay from the first interface to the other which is significant with high frequencies (25 MHz).The transmitted data contains five bits.Four bits are reserved to form data and one bit is reserved to validate window and propagation in each line, which makes the data be received at different time.

    3) Signal distortion: any bad connection in the path from one interface to the other may cause a distortion to the signal by making flickers at its beginning or end.

    Three steps to solve the previous problems are as follows.

    1) Sending clock (transmitter clock 25 MHz) sends data from sender to receiver by using coaxial cable and synchronizes the receiver to this clock.

    2) Using four locations, the first in first out (FIFO)round buffer is enqueued synchronously to the received clock (transmitter clock) and dequeued by receiver clock with one location distance between Enqueue and Dequeue.Because both clocks are 25 MHz[6], the queue head and tail will keep running after each other without any one to cross the other.Due to synchronous buffer and the distance between Enqueue and Dequeue which use same clocks, it is not possible for the queue to run into congestion as shown in Fig.4.

    3) Using a faster clock (133 MHz) at the receiver to latch the data from the transmitter at the middle of transmitted clock, and two fast clocks after the rising edge of the transmitter clock (slow clock), the distortion will be solved by taking a sample in the middle of the data itself.This will solve the propagation delay by waiting two fast clocks after rising edge of transmitter clock (slow clock),give a chance to the different signal to be stable, and ensure all signals received.

    Fig.5 describes the function of the fast clock and Fig.6 shows the internal clock of the cross connector.

    Fig.4.Function of round buffer.

    Fig.5.Fast receiver timing diagram.

    Fig.6.Cross connector internal clock diagram.

    5.2 TCP/IP UP STACK

    The function of TCP/IP UP STACK is the implementation of TCP/IP stack to remove the header of each layer and extract the layers feature.Fig.7 describes the internal structure of TCP/IP UP stack.

    Fig.7.TCP/IP up stack implementation.

    Fig.8.Internal structure of transport layer feature extractor block.

    As shown in Fig.7 the TCP/IP up stack consists of six blocks as follows.

    A.Physical Layer Block

    The function of this block is to remove the PHY header,which is a preamble and start frame delimiter (SFD) to synchronize the received data in RXD with transmitter and determine the starting of the first nipple (4 bits RXD (3 down to 0) as described in MII (2)) of data.After receiving SFD, it sends an enable signal to the nipple counter block to start counting data nipples, to the data link layer block to start removing data link layer headers, and to the time stamp catcher block to catch system time and add it as time stamp to the extracted features, respectively.B.Time Stamp Catcher Block

    This block is just a latch register.It latches the input system time and output, then we can get the system time that the frame is received, which is a time stamp of feature vector.

    Fig.9.Connection selector process flow chart.

    C.Nipple Counter Block

    This block starts a counter to count the received nipple from RXD.It is introduced to all layer blocks (data link layer, network layer and transport layer).The count is used to extract the required features in each block.Each feature has a specific location in the incoming stream, so by the help of this counter, each layer block waits the start and the end of the feature and latches it to the output.

    D.Layer Blocks (Data Link Layer, Network Layer, and

    Transport Layer Blocks)

    These layers blocks extract the features from the incoming nipple stream RXD (3 down to 0).These nipples are pushed into a shift register, waiting the count from nipple counter and latching the data from shift register to output to get this feature.The data link layer sends an enable to its next layer (network layer).No feature are extracted from the data link layer, the features are all starting from the network layer.

    The transport layer internally contains four blocks in order to extract features from each protocol header according to the transport layer protocol extracted from the network layer.Fig.8 describes the internal structure of the transport layer block.The block starts with protocol demultiplexer and sends an enable to one of the three blocks according to the type of protocols.The corresponding protocol extracts the features and introduces these features to the output.When TCP packet arrives, the enable is sent to both UDP and TCP blocks; the UDP block extracts the first two features and the TCP afterward starts to extract the rest of TCP header features.

    5.3 Current Connection Selector

    As described in Section 5.1, the system receives and extracts features from inbound traffic and outbound traffic simultaneously that MII runs in a full duplex mode; this may lead to two frames to be received at the same time.In this case, the system must select one among them to add it to the statistical features extractor queue (features preprocessing queue) and then add the other in first-in first-out (FIFO) manner with balancing between the two data sources (inbound and outbound) by current connection selector.Fig.9 describes the flowchart of current connection selector process.

    In Fig.9, the system checks for the inbound traffic first.If it finds the new inbound features, the system will submit these features to statistical features calculator, else it checks for outbound features.In both cases of inbound check, true or false, the inbound check is followed by outbound check,and vice versus, thus the IDS swings between the inbound check and the outbound check, giving no priority for any of direction over the other.This prevents IDS from being stuck on short frames in any of two flow directions, leaving the other direction waiting infinitely for his turn.If this balance is not established between both directions, an attack to the IDS system itself may happen.

    With short frames on one of IDS traffic, direction attack will stop this direction from functioning and cause all subsequent statistical features to be incorrect because the halted direction frames do not enter the statistical feature queue to be used in calculating these statistical features,causing a deceive to the classifier.

    The output of the current connection selector is a vector identified by selector.The IP address and the port number in either of the two networks (internal or external) identify the connection.We have selected internal network to identify the connection by selecting destination IP address and destination port number as the connection identifier in the case of inbound traffic, and selecting source IP address and source port number as the connection identifier in the case of outbound traffic.This is helpful for the statistical features calculator to calculate connection parameters.

    5.4 Statistical Features Calculator

    This process receives the features from the current connection selector and uses the historical features memory(20X101 synchronous random access memory (RAM)synchronized to the fast clock) to aggregate all past connection as the current target vector to be calculated.The final complete feature vector that is introduced to the classifier in order to classify the feature is extracted as intrusive or normal one.

    A.Historical Connections Memory

    This memory is 20 record memory in length and 110-bit in width.The 101-bit carries the history of incoming features from connection selector process; this history will be used further in the statistical calculations.

    B.Statistics Aggregator

    The function of the statistics aggregator is to aggregate the historical connections memory into one record according to the target connection.This aggregator scans all historical connections memory, searching for this connection history, aggregating the stored values, and producing the final feature vector to be submitted to the last step in NBIDS[1],[5].The output of the statistical features calculator consists of two groups of features as described by DARPA[11]–[13].

    5.5 Connection Classifier

    This process takes the output of statistical features calculator, which is the final feature vector, and uses any classification technique to classify this vector according to pre-learning to this classifier.The output of this process is the attack type.The decision tree is just a one process containing 70 rules generated off-line by SPSS Clementine[13].These 70 rules are just simple IF THEN rules.The IF THEN rules are converted into VHDL codes using C# program and imported into our design to work as the classifier.

    6.C5.0 Model Building Using SPSS Clementine

    Fig.10 represents the stream built to create the C5.0 classifier rule sets.The detailed description of Fig.10 will be given in Section 6.3.

    Fig.11 represents the steps taken to embed C5.0 classifier into the FBGA NBIDS.It describes each process and its input/output.

    6.1 Data Preparation and Storage

    Many steps are involved in this process in order to prepare data for building a model.

    1) Import data from its text representation presented by DARPA into an MS access database.Numbers of imported records are 438331 records.

    2) Build a query in MS access database and select the required features for building the required model.

    3) Build another query t to remove all duplicate records from selected data.These duplicate data will act as outliers for all other records.

    The remaining records after removing redundant data are 76604 records.

    Now after these steps, the data is ready to be used to build our required model.

    6.2 Building ODBC Connection to Access Database

    Open database connectivity (ODBC) is Microsoft’s strategic interface for accessing data in a heterogeneous environment of relational and non-relational database management systems.Based on the call level interface specification of the SQL access group, ODBC provides an open, vendor-neutral way of accessing data stored in a variety of proprietary personal computers, minicomputers,and mainframe databases.

    An ODBC connection is build over access database to enable SPSS Clementine to connect/retrieve feature vectors.

    6.3 Using Clementine to Generate Model

    As shown in Fig.10, Clementine stream contains the following steps to generate model:

    1) Use created ODBC connection to link to access database and retrieve these data to the data source node.This node is displayed as Node 1 in Fig.10, entitled“IDS_features_table”.

    2) Apply a partition in the path of stream to partition data with 70% to create model and 30% to test model.This node name is called the partition node, Node 2 in Fig.10.

    3) Add the C5.0 classifier node, apply 10% noise to the node to simulate real environment, and use 70% partition of data (from its previous node) to build the classifier.This node name is called TRV-SIKO, Node 3 in Fig.10.

    Fig.10.Steps used in generating Clementine model.

    Fig.11.Decision tree generation procedure.

    4) Run the TRV-SIKO node to generate the model,which is added and connected to the stream and called TRV-SOKSOK, Node 4 in Fig.10.

    5) Add the analysis node, Node 5, to analyze model.

    6) Add the table node, Node 6, to see the model results.

    7) Add the matrix mode, Node 7, to generate confusion matrix of model.

    8) Use the TRV-SOKSOK node to generate the rule set node, Node 8, which is called TRV-SOKSOKRS-RULES.

    NOTE: Each node name in the above Clementine stream steps is the user-defined name (dummy name).

    6.4 Exporting Generated Model to XML File

    Extensible markup language (XML) is a markup language much like HTML.XML was designed to carry data, not to display data.XML is self-descriptive; its tags are not predefined.One must define his own tags.XML is a World Wide Web Consortium (W3C) recommendation.The generated rule set node TRV-SOKSOK in previous section is used to export these rules into XML file.This XML file carries the schema and data of these rules.

    6.5 Using Microsoft Visual Studio Dot Net to Build Rule Converter

    Microsoft Visual Studio Dot Net (VS.NET) is a platform independent and web based extensible language.VS.NET is used to build a C# program as a code generator for VHDL.The C# program takes the generated XML rule set, parse it and then generate the required VHDL code representing these rules.

    6.6 Importing Generated VHDL into Hardware NBIDS

    The generated VHDL from previous step is merged by the NBIDS design.The whole system is compiled and built to generate the VHDL modules.The generated VHDL is taken into Xilinx download tool (Xilinx ISE 9.1i).In order to download the VHDL into FPGA chip, the design must pass through the following download steps: 1) user constraints, 2) synthesizing, 3) translating, 4) mapping, 5)placing, 7) routing step, 8) generating programming file and finally, 9) Downloading design[3],[8],[9].

    7.Performance Evaluation of the Proposed System

    The system as described in Section 5 ran in two clocks.The first clock is the slow lock RX CLK which is the MII sampling clock[6](25 MHz) used to sample data from physical layer, while the other clock is the fast clock (133 MHz), more than five time faster, used in the rest of system blocks.

    7.1 End to End Delay (Frame Enter/Exit Delay)

    The traffic enters/exits the system through the cross connector (Section 5.1).The cross connector block just delays the traffic.There are three slow clocks (25 MHz) in a pipeline fashion.One clock is used for fast receiver blockwith which the data are sampled after two clocks from the rising edge of slow clock (see Fig.5), one clock is used for round buffer enqueue, and the final clock is used for round buffer selector dequeue (see Section 5.1, Fig.4 and Fig.6).So the end to end delay=3×40 ns=120 ns=0.12 ms.This is the only delay added from our system to the packet while traversing our system.

    Table 1: Execution time for classification stages

    7.2 Processing Time

    The processing time is the time taken by our system from receiving the features from TCP/IP up stack (Section 5.2) until a frame is judged if it is normal or attack.All this process is executed by the fast clock (133 MHz) and is divided into three stages as described in Table 1 and as shown in Fig.3.

    Table 1 displays total 26 fast clocks.These clocks are used to classify the packet: either a normal packet or an attack packet.

    7.3 Proposed System Immunity

    Our system is found to be immune against the following attacks.

    Denial of service (DoS) attack:

    This is an attack to the IDS system itself.Sending a very short packet to the inbound and/or outbound directions of the IDS system will cause IDS to give priority to attacked direction over the other, causing the other direction to be open in front of other attacks.

    A.How Did We Face DoS Attacks?

    The current connection selector (CCS) balances the processing between two directions by using the flow chart as shown in Fig.9.This case will never happen as we stated in the above sections.

    Buffer overflow (BOF) attack:

    This attack happens when the system receive a new data to process while it has not finished the current one yet.In this case, the system has to buffer the new data until finishing the current one.Moreover, by increasing traffic,the problem is repeated many times and it is overwhelmed with packets until the buffer is full and the system is crashed.

    B.How Did We Face BOF Attacks?

    As mentioned previously, the total processing time of the system is 26 fast clocks.The minimum frame length determined by IEEE is 64 byte.According to IEEE specification in MII[6], the data is transmitted/received by 25 MHz clock (slow clock), four bits at a time, i.e., to transmit/receive a Byte needs two clocks.So to transmit the shortest frame, 64×2=128 slow clocks are needed.As 128 slow clocks equal 128×5=640 fast clocks (because we process with the fast clock 133 MHz, five times of the receive clock), the gap between any two shortest frames is 640 fast clocks, while we just need 26 clocks to finish classifying the packet to be normal or attack.That is, we will never encounter buffer overflow conditions because we have more than 600 clocks to wait the next frame.Therefore, no buffer is required to be overwhelmed or overflowed.

    7.4 Sensitivity and Specificity Measure for Results

    As the interest in intrusion detection has grown, the topic of evaluation of IDS has also received great attention[14]–[17].Sensitivity and specificity are the statistical measures of the performance of a classification test.Classification measures the mappings from the input value X into the classified value Y.

    The sensitivity (also called recall rate in some fields)measures the proportion of actual positives, which are correctly identified as: Sensitivity =TP/(TP+FN)[18],[19].

    The specificity measures the proportion of negatives,which are correctly identified as: Specificity=TN/(FP+TN)[18],[19].

    Positive predictive value or the precision rate is the proportion of positive test classified correctly: Positive predictive value=TP/(TP + FP)[18],[19].

    Negative predictive value is the proportion of negative test diagnosed correctly: Negative predictive value=TN/(TN + FN)[18],[19].

    Table 2 summarizes the results of measured parameters.

    8.Comparative Study between Software & Hardware IDS

    Software-based IDS runs directly over transport layer,waiting TCP/IP stack of host and carrying the IDS application to extract features from physical layer, data link layer, network layer, and transport layer[20]–[22].The total delay imposed on a software-based IDS traffic passing are three delays:

    1) Receive delay: this delay is wasted in the motion of traffic in the lower layers of TCP/IP stack of host, carrying software-based IDS Down to UP direction.Assuming this delay is only for the first four layers.

    2) Processing delay: this is the delay of the processing inside the IDS system itself.

    3) Transmit delay: this delay is the same as receive delay except for being wasted in transmitting traffic UP to Down in TCP/IP stack.

    The minimum combination for transmit delay or receive delay of running protocols in the first four layers are Ethernet protocol at data link layer, IP protocol at Network layer, and UDP protocol at transport layer.The minimum lengths of these protocols are 14 Byte.The Ethernet header is 20 Byte for IP header without any options or padding while the UDP header is 8 Bytes.Therefore, the minimum delay for any software-based IDS is 42 Bytes (14+20+8=42 Bytes) before starting processing.According to MII, to receive 42 Byte we need 42×2 clocks=84 clocks at each direction (transmit or receive).So thetotal transmit/receive delay is 2×84 =168 clocks (each clock of 25 MHz is 40 ns period).In addition, the minimum transmit delay + receive delay is 168×40=6720 ns=6.72 ms.But our end to end delay is only 0.12 ms.

    Table 2: Sensitivity and specificity results

    9.Conclusion and Future Directions

    In this work, a model and its implementation are introduced for building on-chip IDS which satisfies the requirements of the IDS state-of-the-art.The proposed solution is cheep and applicable according to its minimum requirements.We designed the proposed model solution architecture to satisfy the requirements of the IDS.We show that the proposed solution can be optimized for FPGA implementation.In addition, we introduced performance and accuracy measures of the proposed system.

    The overall system accuracy is 99.93%.We impose 0.12 ms pipeline delays to network traffic.All features extraction and classification are carried out in parallel.Our system is immune against DoS and BOF attacks.

    The presented work is capable of managing any 10100 Mbps Ethernet network.It can serve wireless networks with a little modification of the MAC layer (lower sub-layer of data link layer) to the format of wireless MAC.Using C5.0 gives us a high classification rate and the convenience of implementation by using FPGA.The system can work in a heterogeneous environment independent of operating system or device type as the data source comes as network packets, which are standard.From performance point of view, the software-based IDS has the 56 times (5.72/0.12)delay of our model, making the proposed model to be pioneer in minimum end-to-end delay.

    We implemented FPGA-based network traffic security by using C5.0 decision tree classifier.However, there remain many open issues and future challenges as follows:

    1) Searching for more recent training datasets is important to replace DARPA, which is a little old one.

    2) More features are required to be used in classification process, implementing GMII, XGMII[6]with higher network rates (1 Gbps, 10 Gbps, and 100 Gbps).

    3) Implementing wireless Mac layer is important in adding wireless interface.

    4) Searching more classification methods, not just decision tree, and implementing them over FPGA.

    5) Building more than one classifier in the hardware system and using voting techniques to classify attack.

    6) Enhancing immunity of IDS by solving other types of IDS attacks.In addition, implementing IPv6 protocol stack is an important issue.

    [1]A.K.Rahuman and G.Athisha, “Reconfigurable hardware architecture for network intrusion detection system,”American Journal of Applied Sciences, vol.9, no.10, pp.1618–1624, 2012.

    [2]S.Mühlbach and A.Koch, “NetStage/DPR: A self-reconfiguring platform for active and passive network security operations,” Microprocessors and Microsystems,vol.36, no.8, pp.632–643, 2012.

    [3]J.Singaraju and J.A.Chandy, “FPGA based string matching for network processing applications,”Microprocessors and Microsystems, vol.32 no.4, pp.210–222, 2008.

    [4]S.Bojani, V.Pejovi, G.Caffarena, V.Milovanovi, C.Carreras, and J.Popovi, “User profiling in FPGA for intrusion detection systems,” Ⅰnformation Assurance and Security Letters, vol.1, no.1, pp.12–17, 2010.

    [5]V.P.Sampath, “FPGA based intrusion detection,” World Journal of Science and Technology, vol.1, no.8, pp.100–102, 2011.

    [6]802.3-2005: IEEE Standard for Information technology—Telecommunications and Information Exchange between Systems—Local and Metropolitan Area Networks—Specific requirements Part 3: Carrier Sense Multiple Access with Collision Detection (CSMA/CD) Access Method and Physical Layer Specifications, IEEE Computer Society Sponsored by the LAN/MAN Standards Committee, 2005.

    [7]A.Das, D.Nguyen, J.Zambreno, G.Memik, and A.Choudhary “An FPGA-based network intrusion detection architecture,” ⅠEEE Trans.on Ⅰnformation Forensics and Security, vol.3, no.1, pp.118–132, 2008.

    [8]J.M.B.Serrano and J.H.Palancar, “String alignment pre-detection using unique subsequences for FPGA-based network intrusion detection,” Computer Communications,vol.35, no.6, pp.720–728, 2012.

    [9]T.Katashita, Y.Yamaguchi, A.Maeda, and K.Toda,“FPGA-based intrusion detection system for 10 gigabit Ethernet,” ⅠEⅠCE Trans.Ⅰnf.& Syst., vol.E90–D, no.12, pp.1923–1931, 2007.

    [10]X.Support, Spartan-3A/3AN Starter Kit Board User Guide,Xilinx, 2007.

    [11]C.-M.Chen, Y.-L.Chen, and H.-C.Lin, “An efficient network intrusion detection,” Computer Communications,vol.33, no.4, pp.477–484, 2010.

    [12]H.-J.Liao, C.-H.Richard, Y.-C.Lin, and K.-Y.Tung,“Intrusion detection system: a comprehensive review,”Journal of Network and Computer Applications, vol.36, no.1, pp.16–24, 2013.

    [13]S.Landau and B.S.Everitt, A Handbook Of Statistical Analyses Using SPSS, London: Chapman and Hall/CRC,2nd ed.2006.

    [14]R.P.Lippmann, D.J.Fried, I.Graf, et al., “Evaluating intrusion detection systems: the 1998 DARPA Off-line intrusion detection evaluation,” in Proc.of DARPAⅠnformation Survivability Conf.and Exposition, Los Alamitos, 2000, pp.12–26.

    [15]M.Ranum, “Experiences benchmarking intrusion detection systems,” NFR Security White Paper, 2001.

    [16]R.Lippmann, J.W.Haines, D.J.Fried, J.Korba, and K.Das, “The 1999 DARPA off-line intrusion detection evaluation,” presented at the Second Int.Workshop on Recent Advances in Intrusion Detection, West Lafayette,1999.

    [17]DARPA intrusion detection evaluation.[Online].Available:http://www.ll.mit.edu/mission/communications/cyber/CSTc orpora/ideval/

    [18]N.Ye, The Handbook of Data Mining, Mahwah: Lawrence Erlbaum Associates, 2008.

    [19]Sensitivity and specificity.[Online].Available:http://en.wikipedia.org/wiki/Sensitivity_and_specificity

    [20]M.I.Amer, T.S.Sobh, and G.I.Mohamed, “Using hash table to extract real-time online network traffic features for hardware IDS,” Ⅰnformation Security Journal: A Global Perspective, vol.21, no.1, pp.55–63, 2012.

    [21]T.S.Sobh and Y.Aly, “effective and extensive virtual private network,” Journal of Ⅰnformation Security, vol.2, no.1, pp.39–49, 2011.

    [22]T.S.Sobh and M.I.Amer, “PGP modification for securing digital envelope mail using COM+ and web services,” Ⅰnt.Journal of Network Security, vol.12, no.3, pp.273–285,2011.

    2021天堂中文幕一二区在线观| 中文字幕人妻熟人妻熟丝袜美| 激情 狠狠 欧美| 国产黄a三级三级三级人| www.色视频.com| 午夜影院日韩av| 人人妻人人澡欧美一区二区| 国产免费一级a男人的天堂| 国产免费一级a男人的天堂| 精品人妻偷拍中文字幕| 女同久久另类99精品国产91| 午夜视频国产福利| 欧美成人免费av一区二区三区| 国模一区二区三区四区视频| 在线观看美女被高潮喷水网站| 久久久久久久久久黄片| 神马国产精品三级电影在线观看| 国产高清视频在线播放一区| 国产精品一区二区性色av| 精品一区二区三区视频在线观看免费| 成人特级黄色片久久久久久久| 全区人妻精品视频| 白带黄色成豆腐渣| 两性午夜刺激爽爽歪歪视频在线观看| 伊人久久精品亚洲午夜| 中国美白少妇内射xxxbb| 亚洲国产日韩欧美精品在线观看| 麻豆一二三区av精品| 波多野结衣巨乳人妻| 亚洲人成网站高清观看| 欧美丝袜亚洲另类| 午夜老司机福利剧场| 精品欧美国产一区二区三| 美女 人体艺术 gogo| 久久国内精品自在自线图片| 最近2019中文字幕mv第一页| 美女 人体艺术 gogo| 99热全是精品| 在线免费观看不下载黄p国产| 国产精品美女特级片免费视频播放器| 禁无遮挡网站| 久久午夜福利片| 久久国内精品自在自线图片| 麻豆国产av国片精品| 欧美色欧美亚洲另类二区| 日本黄色片子视频| 老司机午夜福利在线观看视频| 亚洲人成网站在线播| 直男gayav资源| 中文字幕精品亚洲无线码一区| 非洲黑人性xxxx精品又粗又长| 午夜激情福利司机影院| 久久精品夜色国产| 国产单亲对白刺激| 校园春色视频在线观看| 亚洲欧美精品综合久久99| 成人亚洲精品av一区二区| 免费黄网站久久成人精品| 亚洲美女搞黄在线观看 | 国产精品不卡视频一区二区| 日韩精品中文字幕看吧| 伦理电影大哥的女人| 亚洲av五月六月丁香网| 精品不卡国产一区二区三区| 高清午夜精品一区二区三区 | 成人欧美大片| 欧美最黄视频在线播放免费| 可以在线观看毛片的网站| 91在线观看av| 搡老岳熟女国产| 日本黄色视频三级网站网址| 在线天堂最新版资源| 一区二区三区高清视频在线| 亚洲激情五月婷婷啪啪| 亚洲精品日韩在线中文字幕 | 国产一级毛片七仙女欲春2| 日韩欧美 国产精品| 国产真实伦视频高清在线观看| 男人舔女人下体高潮全视频| 国产不卡一卡二| 男女做爰动态图高潮gif福利片| 国产男靠女视频免费网站| 男女做爰动态图高潮gif福利片| www.色视频.com| 久久久久久大精品| 亚洲av第一区精品v没综合| 综合色丁香网| 一区二区三区免费毛片| 久久久国产成人免费| 一级av片app| 亚洲人成网站在线播| 免费一级毛片在线播放高清视频| 久久久欧美国产精品| 伦理电影大哥的女人| 亚洲成人av在线免费| 91久久精品电影网| 最好的美女福利视频网| 日本与韩国留学比较| 亚洲精品成人久久久久久| 男女下面进入的视频免费午夜| 久久欧美精品欧美久久欧美| 国产三级在线视频| 黄片wwwwww| 国产私拍福利视频在线观看| 欧美性猛交黑人性爽| 超碰av人人做人人爽久久| 美女xxoo啪啪120秒动态图| 色综合站精品国产| 久久久精品94久久精品| 日本爱情动作片www.在线观看 | 国产激情偷乱视频一区二区| 伦精品一区二区三区| 网址你懂的国产日韩在线| 国内精品久久久久精免费| 亚洲av不卡在线观看| 中文在线观看免费www的网站| 麻豆一二三区av精品| 97超碰精品成人国产| 欧美人与善性xxx| 亚洲成人av在线免费| 又粗又爽又猛毛片免费看| 亚洲精品亚洲一区二区| 久久精品国产自在天天线| 亚洲av免费在线观看| 精品久久久久久久久av| 亚洲精品粉嫩美女一区| 亚洲最大成人av| 狠狠狠狠99中文字幕| 日韩av在线大香蕉| 久久午夜亚洲精品久久| 中文字幕精品亚洲无线码一区| 日本黄色片子视频| 最新在线观看一区二区三区| 成年av动漫网址| 国产激情偷乱视频一区二区| 免费观看精品视频网站| 夜夜爽天天搞| 国产亚洲精品av在线| 国产精品久久久久久av不卡| 国产在线男女| 国产成年人精品一区二区| 小说图片视频综合网站| 亚洲欧美日韩高清在线视频| 国产探花在线观看一区二区| 日本熟妇午夜| 一级黄色大片毛片| 亚洲欧美精品自产自拍| 日韩欧美精品v在线| 免费高清视频大片| а√天堂www在线а√下载| 1024手机看黄色片| 日本黄色片子视频| 欧美潮喷喷水| 欧美人与善性xxx| 国产高清视频在线播放一区| 欧美日韩在线观看h| 国产高清激情床上av| 欧美性猛交黑人性爽| 日韩av在线大香蕉| 亚洲国产色片| 三级毛片av免费| 蜜桃久久精品国产亚洲av| 中文字幕久久专区| 亚洲无线观看免费| 欧美三级亚洲精品| 波多野结衣高清无吗| 最新中文字幕久久久久| 欧美一区二区精品小视频在线| 婷婷亚洲欧美| 亚洲精品亚洲一区二区| 男女做爰动态图高潮gif福利片| 久久精品综合一区二区三区| 欧美成人一区二区免费高清观看| 色视频www国产| 亚洲欧美日韩高清在线视频| 日本成人三级电影网站| 久久人人精品亚洲av| a级毛片免费高清观看在线播放| 舔av片在线| 国产精华一区二区三区| 久久久久久久久久久丰满| 国产探花极品一区二区| 99久久久亚洲精品蜜臀av| 婷婷色综合大香蕉| 久久久久久国产a免费观看| 一个人观看的视频www高清免费观看| 久久精品国产亚洲网站| 国产在视频线在精品| 亚洲欧美日韩东京热| 欧美又色又爽又黄视频| 国产精品人妻久久久影院| 成年女人永久免费观看视频| 天天躁日日操中文字幕| 桃色一区二区三区在线观看| 国产欧美日韩精品一区二区| 亚洲专区国产一区二区| 欧美日韩精品成人综合77777| 一夜夜www| 一级av片app| 麻豆一二三区av精品| 身体一侧抽搐| 五月玫瑰六月丁香| 日韩高清综合在线| 特大巨黑吊av在线直播| 国产伦在线观看视频一区| 99久久久亚洲精品蜜臀av| 美女大奶头视频| or卡值多少钱| 三级毛片av免费| 小蜜桃在线观看免费完整版高清| av在线蜜桃| 久久99热这里只有精品18| 亚洲av第一区精品v没综合| 色视频www国产| 别揉我奶头 嗯啊视频| 国产91av在线免费观看| 亚洲最大成人中文| 精品一区二区三区视频在线观看免费| 国产不卡一卡二| 日韩强制内射视频| 成人av在线播放网站| av在线老鸭窝| 大香蕉久久网| 日产精品乱码卡一卡2卡三| 日韩三级伦理在线观看| 深爱激情五月婷婷| 最近在线观看免费完整版| 国产综合懂色| 日韩精品中文字幕看吧| 免费在线观看影片大全网站| 日本 av在线| 69人妻影院| 老司机福利观看| 久久亚洲国产成人精品v| 亚洲电影在线观看av| 久久久成人免费电影| 亚洲欧美日韩卡通动漫| 欧美3d第一页| 联通29元200g的流量卡| 永久网站在线| 日韩中字成人| 亚洲性夜色夜夜综合| 国产麻豆成人av免费视频| 精品一区二区三区av网在线观看| 国产视频一区二区在线看| 精华霜和精华液先用哪个| 99九九线精品视频在线观看视频| 别揉我奶头~嗯~啊~动态视频| 欧美极品一区二区三区四区| 天堂av国产一区二区熟女人妻| 在线观看66精品国产| 人人妻人人澡欧美一区二区| 综合色av麻豆| 好男人在线观看高清免费视频| 精品久久久久久久久久久久久| 久久久久国产网址| 亚洲精品一区av在线观看| АⅤ资源中文在线天堂| 欧美成人一区二区免费高清观看| 午夜久久久久精精品| 欧美不卡视频在线免费观看| 1000部很黄的大片| 少妇的逼好多水| 国产亚洲精品久久久com| 国产大屁股一区二区在线视频| 国产激情偷乱视频一区二区| 精品一区二区三区人妻视频| 久久99热这里只有精品18| 亚洲av熟女| 国产单亲对白刺激| 午夜日韩欧美国产| 国产女主播在线喷水免费视频网站 | 毛片一级片免费看久久久久| 最近2019中文字幕mv第一页| 天堂av国产一区二区熟女人妻| 免费在线观看影片大全网站| 国产亚洲91精品色在线| 国产淫片久久久久久久久| 亚洲三级黄色毛片| 国内精品美女久久久久久| 精品午夜福利在线看| 国产欧美日韩一区二区精品| 中文在线观看免费www的网站| 日韩一本色道免费dvd| 日韩欧美免费精品| 国产久久久一区二区三区| 听说在线观看完整版免费高清| 99热6这里只有精品| 国产精品电影一区二区三区| 久久人人精品亚洲av| 中国美女看黄片| 麻豆一二三区av精品| 少妇被粗大猛烈的视频| 一本一本综合久久| 成人精品一区二区免费| 人人妻人人澡欧美一区二区| 草草在线视频免费看| 亚洲精品久久国产高清桃花| 啦啦啦观看免费观看视频高清| 成年女人看的毛片在线观看| 有码 亚洲区| 亚洲一区高清亚洲精品| 日本熟妇午夜| 国内揄拍国产精品人妻在线| 国产成人影院久久av| 中文字幕人妻熟人妻熟丝袜美| 看十八女毛片水多多多| 搡女人真爽免费视频火全软件 | 成人二区视频| 欧美激情久久久久久爽电影| 久久久成人免费电影| 国产精品久久久久久av不卡| 成人性生交大片免费视频hd| 赤兔流量卡办理| 一区二区三区高清视频在线| 欧美一区二区国产精品久久精品| 韩国av在线不卡| 18+在线观看网站| 日韩av不卡免费在线播放| 激情 狠狠 欧美| 色av中文字幕| 91在线观看av| 日日啪夜夜撸| 欧美性猛交╳xxx乱大交人| 成人无遮挡网站| 久久久久久久亚洲中文字幕| 插逼视频在线观看| 99久久中文字幕三级久久日本| 亚洲国产精品成人久久小说 | 99久久精品一区二区三区| 欧美+亚洲+日韩+国产| 女人十人毛片免费观看3o分钟| 欧美国产日韩亚洲一区| 99久久久亚洲精品蜜臀av| 99在线人妻在线中文字幕| 秋霞在线观看毛片| 两性午夜刺激爽爽歪歪视频在线观看| 男女下面进入的视频免费午夜| 成人午夜高清在线视频| 99热这里只有精品一区| 国产精品久久久久久久电影| 97超视频在线观看视频| 亚洲精品国产av成人精品 | 国产私拍福利视频在线观看| 日日摸夜夜添夜夜爱| 在线播放国产精品三级| 在线a可以看的网站| 亚洲精品色激情综合| 久久久色成人| 99精品在免费线老司机午夜| av中文乱码字幕在线| 69人妻影院| 观看免费一级毛片| 成人毛片a级毛片在线播放| 九九热线精品视视频播放| 精品日产1卡2卡| 大香蕉久久网| 日韩三级伦理在线观看| 最近2019中文字幕mv第一页| 91在线观看av| 国产高清激情床上av| 成人无遮挡网站| 啦啦啦观看免费观看视频高清| 中文亚洲av片在线观看爽| 久久精品影院6| 免费看av在线观看网站| 久久久欧美国产精品| 国产午夜精品久久久久久一区二区三区 | 亚洲自拍偷在线| 欧美在线一区亚洲| 久久草成人影院| 一个人看的www免费观看视频| 国产成年人精品一区二区| 韩国av在线不卡| 少妇高潮的动态图| 久久久久久久久久黄片| 最新在线观看一区二区三区| 看免费成人av毛片| 亚洲美女视频黄频| 在线免费十八禁| 在线播放无遮挡| 国产高清激情床上av| 99久久精品国产国产毛片| 欧美+日韩+精品| 日韩欧美一区二区三区在线观看| 毛片女人毛片| 少妇的逼水好多| 18禁黄网站禁片免费观看直播| 一个人观看的视频www高清免费观看| 最近最新中文字幕大全电影3| 男人舔奶头视频| 淫秽高清视频在线观看| 99热这里只有是精品在线观看| 日韩精品中文字幕看吧| 日韩三级伦理在线观看| 少妇熟女欧美另类| av天堂中文字幕网| 日韩三级伦理在线观看| 免费在线观看成人毛片| 中文资源天堂在线| 久久欧美精品欧美久久欧美| 噜噜噜噜噜久久久久久91| 中文字幕免费在线视频6| 国产爱豆传媒在线观看| 99国产精品一区二区蜜桃av| 国产av麻豆久久久久久久| 日本色播在线视频| 99riav亚洲国产免费| 看片在线看免费视频| 亚洲欧美日韩无卡精品| 夜夜爽天天搞| 午夜精品一区二区三区免费看| 欧美日韩在线观看h| 日韩欧美精品免费久久| 国产亚洲精品av在线| 久久精品久久久久久噜噜老黄 | 欧美日韩一区二区视频在线观看视频在线 | 2021天堂中文幕一二区在线观| 色综合站精品国产| 亚洲久久久久久中文字幕| 亚洲第一区二区三区不卡| 欧美性感艳星| 十八禁国产超污无遮挡网站| 波多野结衣高清无吗| 国产精品久久久久久av不卡| 国产欧美日韩精品一区二区| 男女下面进入的视频免费午夜| 久久久色成人| 天天一区二区日本电影三级| 国产亚洲91精品色在线| 欧美成人精品欧美一级黄| 99视频精品全部免费 在线| 18禁在线播放成人免费| 欧美国产日韩亚洲一区| 国产精品久久久久久亚洲av鲁大| 丝袜美腿在线中文| 国产伦精品一区二区三区四那| 国产伦精品一区二区三区视频9| 99在线视频只有这里精品首页| 亚洲欧美日韩东京热| 国产欧美日韩精品亚洲av| 别揉我奶头 嗯啊视频| 午夜福利高清视频| 毛片一级片免费看久久久久| 青春草视频在线免费观看| 欧美日韩在线观看h| 国产亚洲av嫩草精品影院| 一边摸一边抽搐一进一小说| 精品人妻视频免费看| 欧美zozozo另类| 国产伦精品一区二区三区四那| 日本 av在线| 亚洲成a人片在线一区二区| 久久久久久久久久成人| 亚洲国产欧洲综合997久久,| 亚洲人成网站高清观看| 91麻豆精品激情在线观看国产| 亚洲第一电影网av| 男人舔女人下体高潮全视频| 日韩 亚洲 欧美在线| 老熟妇仑乱视频hdxx| 美女xxoo啪啪120秒动态图| 看片在线看免费视频| 久久中文看片网| 欧美另类亚洲清纯唯美| 自拍偷自拍亚洲精品老妇| 国产视频内射| 午夜福利高清视频| 亚洲国产精品成人久久小说 | 亚洲精品国产成人久久av| 国产亚洲av嫩草精品影院| 免费看光身美女| 亚洲熟妇熟女久久| 国产又黄又爽又无遮挡在线| 亚洲美女黄片视频| 乱系列少妇在线播放| 夜夜看夜夜爽夜夜摸| 夜夜爽天天搞| 亚洲,欧美,日韩| 国产黄a三级三级三级人| 亚洲第一电影网av| 97碰自拍视频| 午夜福利视频1000在线观看| 日韩精品中文字幕看吧| 久久久久久久午夜电影| 国产又黄又爽又无遮挡在线| 国产一区二区在线观看日韩| 99热这里只有是精品在线观看| 99久久久亚洲精品蜜臀av| 男女视频在线观看网站免费| 亚洲成av人片在线播放无| 亚洲国产欧洲综合997久久,| 日本在线视频免费播放| 精品久久久久久久久亚洲| 99热全是精品| 天天躁夜夜躁狠狠久久av| 国产人妻一区二区三区在| 亚洲第一区二区三区不卡| 成人无遮挡网站| 日韩,欧美,国产一区二区三区 | 欧美日本视频| 国产高清视频在线观看网站| 亚洲久久久久久中文字幕| 久久精品久久久久久噜噜老黄 | 国产一区二区在线观看日韩| 韩国av在线不卡| 国产高潮美女av| av女优亚洲男人天堂| 99视频精品全部免费 在线| 色播亚洲综合网| 搞女人的毛片| 亚洲av第一区精品v没综合| 午夜精品一区二区三区免费看| 久久中文看片网| 久久久久精品国产欧美久久久| 菩萨蛮人人尽说江南好唐韦庄 | 成人毛片a级毛片在线播放| 中国美女看黄片| 人人妻人人澡人人爽人人夜夜 | 国产精品免费一区二区三区在线| 国产v大片淫在线免费观看| 人人妻,人人澡人人爽秒播| 1024手机看黄色片| av.在线天堂| 美女cb高潮喷水在线观看| 亚洲精品一卡2卡三卡4卡5卡| 亚洲性夜色夜夜综合| 亚洲人成网站在线观看播放| 久久精品影院6| 成人美女网站在线观看视频| 日韩三级伦理在线观看| 又黄又爽又刺激的免费视频.| 我的女老师完整版在线观看| 女的被弄到高潮叫床怎么办| 日韩欧美精品v在线| 男人狂女人下面高潮的视频| 亚洲精品在线观看二区| 久久人人爽人人片av| 日韩精品青青久久久久久| 欧美色视频一区免费| 成年女人看的毛片在线观看| 性色avwww在线观看| 熟女电影av网| 性色avwww在线观看| 国内精品美女久久久久久| 亚洲国产色片| 麻豆久久精品国产亚洲av| 最近在线观看免费完整版| 两个人的视频大全免费| 在线免费十八禁| 成人av一区二区三区在线看| 麻豆国产av国片精品| 亚洲电影在线观看av| 好男人在线观看高清免费视频| 精品一区二区三区人妻视频| 国产精华一区二区三区| 熟女电影av网| 禁无遮挡网站| 12—13女人毛片做爰片一| 日韩 亚洲 欧美在线| 色哟哟哟哟哟哟| 精品人妻熟女av久视频| 亚洲专区国产一区二区| 日日干狠狠操夜夜爽| 三级经典国产精品| 亚洲高清免费不卡视频| 99视频精品全部免费 在线| 日本一二三区视频观看| 国产精品一区二区性色av| 久99久视频精品免费| 亚洲av中文av极速乱| 久久精品夜色国产| 亚洲国产精品sss在线观看| 中出人妻视频一区二区| 欧美日韩精品成人综合77777| 久久精品国产99精品国产亚洲性色| 五月伊人婷婷丁香| 免费黄网站久久成人精品| 色综合亚洲欧美另类图片| 国产精品永久免费网站| 男女下面进入的视频免费午夜| 国产精品久久电影中文字幕| 亚洲欧美成人综合另类久久久 | 久久精品影院6| 免费人成在线观看视频色| 男女边吃奶边做爰视频| 91在线观看av| 岛国在线免费视频观看| 免费无遮挡裸体视频| 美女cb高潮喷水在线观看| 亚洲成人久久性| 国产中年淑女户外野战色| 成人三级黄色视频| 亚洲不卡免费看| 日韩三级伦理在线观看| 麻豆一二三区av精品| 国产精品女同一区二区软件| 欧美激情国产日韩精品一区| 两个人视频免费观看高清| 亚洲成人av在线免费| 麻豆国产av国片精品| 国产三级中文精品| 欧美丝袜亚洲另类| 日日啪夜夜撸| 成熟少妇高潮喷水视频| av免费在线看不卡| 美女被艹到高潮喷水动态| 淫秽高清视频在线观看| 黄色一级大片看看| 禁无遮挡网站| 久久欧美精品欧美久久欧美| 特大巨黑吊av在线直播| 99久久精品热视频| 啦啦啦观看免费观看视频高清| 久久久久久国产a免费观看|