• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    FPGA-Based Network Traffic Security: Design and Implementation Using C5.0 Decision Tree Classifier

    2013-11-26 11:49:46TarekSalahSobhandMohamedIbrahiemAmer

    Tarek Salah Sobh and Mohamed Ibrahiem Amer

    1.Introduction

    Intrusion detection is still an open area for researchers.Building a network based intrusion detection system(NBIDS) requires abilities to monitor, mange, and process a millions of packets in a very short-time interval[1],[2].These packets have various formats, different hosts with different operating systems and variable lengths of data.This high variance in format, length, and content needs real-time,intelligent, and accurate systems to deal with, at the mean while these systems should be itself secure and reliable.The software, intrusion detection system (IDS), has many drawbacks in the field of NBIDS[1],[2].

    Security of software systems is a function in the security of the hosting system.Performance of software systems has many limitations especially when dealing with a high data bursts (lots of data in short time).Software usually fails at very high traffic conditions.Network traffic is a millions of packets passing in and out of the network in very short periods that needs a dedicated, real-time, reliable,highly available, and secure appliance having intrusion detection as its only task.This work focuses on the design and implementation of hardware network based intrusion detection system using field programmable gate array(FPGA) technology as a core to the system[3]–[5].We elaborated the implementation and the use of hardware appliance in network security.The novel FPGA was implemented for packet processing and connection monitor,aiming finally to implement on chip.The proposed implementation provides a new potential, which can further lead to better performances and more reliable security systems to overcome many speed drawbacks.

    The rest of the paper is organized as follows.Section 2 gives a background on Media Independent Interface IEEE Standard 802.3 Clause 22.Section 3 explains the proposed model.Section 4 describes the implementation details of the proposed model.Section 5 presents the function of TCP/IP stack and its implementation.Section 6 introduces C5.0 model using SPSS Clementine.Section 7 presents the performance evaluation results of this work while.Section 8 gives an end-to-end delay comparative study between software-based IDS and hardware-based IDS.Finally, the conclusions and future directions are drawn in Section 9.

    2.Media Independent Interface IEEE Standard 802.3 Clause 22

    Media independent interface (MII) concerns with 100 Mbps fast Ethernet for describing its functions and specifications[6].This clause defines the logical, electrical,and mechanical characteristics for the reconciliation sublayer (RS) and MII between carrier sense multiple access/collision detect (CSMA/CD) media access controllers and various physical layers (PHYs).Fig.1 shows the location of MII relative to the ISO/OSI reference model.

    Fig.1.MII relationship to the ISO/OSI reference model.

    Fig.2.System block diagram.

    The purpose of this interface is to provide a simple,inexpensive, and easy-to-implement interconnection between media access control (MAC) sub-layers and PHYs for data transfer at 10 Mb/s and 100 Mb/s, and between station management (STA) and PHY entities supporting data transfer at 10 Mb/s or above.

    MII can support two specific data rates, 10 Mb/s and 100 Mb/s.The functionality is identical at both data rates,so are the signal timing relationships.

    3.Proposed Model

    FPGA hardware is used as a platform to perform high speed packet processing and connection monitor, aiming finally to implement on-chip IDS to be placed at the edge of protected network for providing high performance requirements[7]–[9].

    This system must have a parallel processing and intelligence as main basic features.Fig.2 represents the hardware realization of the solutions for implementing the proposed hardware IDS.The proposed system as shown is symmetric around the inference engine from the point of view of the inbound traffic and outbound traffic.The system consists of the following main components.

    1) Network interface: its main function is to carry out all the physical layer signaling and protocols that firstly collect the datagram frames from the communication media.This component exists at the face of both interfaces inbound and outbound.

    2) Feature extractor: its main function is to extract the layer 2, 3 and four of the collected traffic by the network interface.This component also exists at the face of both inbound and outbound.If the traffic passes through the inbound and outbound extractor simultaneously, there is no difference between their detection results.

    3) Attacks database: it carries all patterns and features of attacks.These patterns are used to train the inference engine.This component exists once only for the inference engine.

    4) Detection inference engine: this is the intelligent component in the system, receiving and classifying the extracted features by the feature extractor component, and then finally taking decision about this traffic if it is either normal or attack.This decision can further be introduced to prevention module that has the capability of blocking or forwarding the traffic to the other party (inbound or outbound).

    5) Prevention module: the prevention module is a gateway of inbound and outbound traffic, forwarding or blocking the traffic.

    4.Minimum Hardware Requirements to Implement the Proposed System

    The proposed system must meet the following minimum requirements to implement our design.

    1) Support MII interface for interfacing with network.

    2) Clock with 133 MHz frequency or higher.

    3) Memory (RAM) with minimum capacity of 2 Kbit or higher.

    4) Two or more MII Ethernet interfaces (one is enough but the board in this case must has at least 12 bit-expansion slots to connect to any other external MII Ethernet interfaces).

    Xilinx has released the Spartan-3A/3AN board, which is the most suitable toolkit for implementing our design.Spartan-3A/3AN can meet the minimum hardware requirements of systems[10].

    5.Implementation Details of the Proposed Model

    Fig.3 represents the implementation of the proposed model using FPGA.The DeMilitarized Zone (DMZ)network in the model represents the trusted network to be protected; the wide area network (WAN) represents the untrusted external network.The DMZ and WAN share inbound and outbound traffic that is generated by DMZ and to be transmitted to WAN is outbound traffic from DMZ point of view and inbound traffic from WAN point of view and vice versus.

    Fig.3.Implementation of proposed system.

    5.1 Cross Connector

    The functions of the cross connector is to implement MII interface to both DMZ or WAN: pass traffic in both directions without adding significant delay by connecting transmitter of DMZ traffic to receiver of WAN traffic and VSS (vNetwork standard switch); introduce traffic to TCP/IP stack for start processing, and synchronize data flow between two network interfaces (two MII interfaces).Finally, the cross connector, using TCP/IP stack, can be used in the future with prevention module to block or pass traffic by raising error flag signals (MII TX ERR or RX ERR).This process receives the input from both directions of the flows.WAN-RXD is connected to DMZ-TXD and DMZ-RXD is connected to WAN-TXD, also WAN-RX DV to DMZ-TX EN and DMZ-RX DV to WAN-TX EN.The connection between the transmitters of one stream to the receiver of the other has many problems as following.

    1) Synchronization problem: each MII interface works independently of the other and has its own asynchronous clock.

    2) Propagation delay: the signal transmitted from one card takes a propagation delay from the first interface to the other which is significant with high frequencies (25 MHz).The transmitted data contains five bits.Four bits are reserved to form data and one bit is reserved to validate window and propagation in each line, which makes the data be received at different time.

    3) Signal distortion: any bad connection in the path from one interface to the other may cause a distortion to the signal by making flickers at its beginning or end.

    Three steps to solve the previous problems are as follows.

    1) Sending clock (transmitter clock 25 MHz) sends data from sender to receiver by using coaxial cable and synchronizes the receiver to this clock.

    2) Using four locations, the first in first out (FIFO)round buffer is enqueued synchronously to the received clock (transmitter clock) and dequeued by receiver clock with one location distance between Enqueue and Dequeue.Because both clocks are 25 MHz[6], the queue head and tail will keep running after each other without any one to cross the other.Due to synchronous buffer and the distance between Enqueue and Dequeue which use same clocks, it is not possible for the queue to run into congestion as shown in Fig.4.

    3) Using a faster clock (133 MHz) at the receiver to latch the data from the transmitter at the middle of transmitted clock, and two fast clocks after the rising edge of the transmitter clock (slow clock), the distortion will be solved by taking a sample in the middle of the data itself.This will solve the propagation delay by waiting two fast clocks after rising edge of transmitter clock (slow clock),give a chance to the different signal to be stable, and ensure all signals received.

    Fig.5 describes the function of the fast clock and Fig.6 shows the internal clock of the cross connector.

    Fig.4.Function of round buffer.

    Fig.5.Fast receiver timing diagram.

    Fig.6.Cross connector internal clock diagram.

    5.2 TCP/IP UP STACK

    The function of TCP/IP UP STACK is the implementation of TCP/IP stack to remove the header of each layer and extract the layers feature.Fig.7 describes the internal structure of TCP/IP UP stack.

    Fig.7.TCP/IP up stack implementation.

    Fig.8.Internal structure of transport layer feature extractor block.

    As shown in Fig.7 the TCP/IP up stack consists of six blocks as follows.

    A.Physical Layer Block

    The function of this block is to remove the PHY header,which is a preamble and start frame delimiter (SFD) to synchronize the received data in RXD with transmitter and determine the starting of the first nipple (4 bits RXD (3 down to 0) as described in MII (2)) of data.After receiving SFD, it sends an enable signal to the nipple counter block to start counting data nipples, to the data link layer block to start removing data link layer headers, and to the time stamp catcher block to catch system time and add it as time stamp to the extracted features, respectively.B.Time Stamp Catcher Block

    This block is just a latch register.It latches the input system time and output, then we can get the system time that the frame is received, which is a time stamp of feature vector.

    Fig.9.Connection selector process flow chart.

    C.Nipple Counter Block

    This block starts a counter to count the received nipple from RXD.It is introduced to all layer blocks (data link layer, network layer and transport layer).The count is used to extract the required features in each block.Each feature has a specific location in the incoming stream, so by the help of this counter, each layer block waits the start and the end of the feature and latches it to the output.

    D.Layer Blocks (Data Link Layer, Network Layer, and

    Transport Layer Blocks)

    These layers blocks extract the features from the incoming nipple stream RXD (3 down to 0).These nipples are pushed into a shift register, waiting the count from nipple counter and latching the data from shift register to output to get this feature.The data link layer sends an enable to its next layer (network layer).No feature are extracted from the data link layer, the features are all starting from the network layer.

    The transport layer internally contains four blocks in order to extract features from each protocol header according to the transport layer protocol extracted from the network layer.Fig.8 describes the internal structure of the transport layer block.The block starts with protocol demultiplexer and sends an enable to one of the three blocks according to the type of protocols.The corresponding protocol extracts the features and introduces these features to the output.When TCP packet arrives, the enable is sent to both UDP and TCP blocks; the UDP block extracts the first two features and the TCP afterward starts to extract the rest of TCP header features.

    5.3 Current Connection Selector

    As described in Section 5.1, the system receives and extracts features from inbound traffic and outbound traffic simultaneously that MII runs in a full duplex mode; this may lead to two frames to be received at the same time.In this case, the system must select one among them to add it to the statistical features extractor queue (features preprocessing queue) and then add the other in first-in first-out (FIFO) manner with balancing between the two data sources (inbound and outbound) by current connection selector.Fig.9 describes the flowchart of current connection selector process.

    In Fig.9, the system checks for the inbound traffic first.If it finds the new inbound features, the system will submit these features to statistical features calculator, else it checks for outbound features.In both cases of inbound check, true or false, the inbound check is followed by outbound check,and vice versus, thus the IDS swings between the inbound check and the outbound check, giving no priority for any of direction over the other.This prevents IDS from being stuck on short frames in any of two flow directions, leaving the other direction waiting infinitely for his turn.If this balance is not established between both directions, an attack to the IDS system itself may happen.

    With short frames on one of IDS traffic, direction attack will stop this direction from functioning and cause all subsequent statistical features to be incorrect because the halted direction frames do not enter the statistical feature queue to be used in calculating these statistical features,causing a deceive to the classifier.

    The output of the current connection selector is a vector identified by selector.The IP address and the port number in either of the two networks (internal or external) identify the connection.We have selected internal network to identify the connection by selecting destination IP address and destination port number as the connection identifier in the case of inbound traffic, and selecting source IP address and source port number as the connection identifier in the case of outbound traffic.This is helpful for the statistical features calculator to calculate connection parameters.

    5.4 Statistical Features Calculator

    This process receives the features from the current connection selector and uses the historical features memory(20X101 synchronous random access memory (RAM)synchronized to the fast clock) to aggregate all past connection as the current target vector to be calculated.The final complete feature vector that is introduced to the classifier in order to classify the feature is extracted as intrusive or normal one.

    A.Historical Connections Memory

    This memory is 20 record memory in length and 110-bit in width.The 101-bit carries the history of incoming features from connection selector process; this history will be used further in the statistical calculations.

    B.Statistics Aggregator

    The function of the statistics aggregator is to aggregate the historical connections memory into one record according to the target connection.This aggregator scans all historical connections memory, searching for this connection history, aggregating the stored values, and producing the final feature vector to be submitted to the last step in NBIDS[1],[5].The output of the statistical features calculator consists of two groups of features as described by DARPA[11]–[13].

    5.5 Connection Classifier

    This process takes the output of statistical features calculator, which is the final feature vector, and uses any classification technique to classify this vector according to pre-learning to this classifier.The output of this process is the attack type.The decision tree is just a one process containing 70 rules generated off-line by SPSS Clementine[13].These 70 rules are just simple IF THEN rules.The IF THEN rules are converted into VHDL codes using C# program and imported into our design to work as the classifier.

    6.C5.0 Model Building Using SPSS Clementine

    Fig.10 represents the stream built to create the C5.0 classifier rule sets.The detailed description of Fig.10 will be given in Section 6.3.

    Fig.11 represents the steps taken to embed C5.0 classifier into the FBGA NBIDS.It describes each process and its input/output.

    6.1 Data Preparation and Storage

    Many steps are involved in this process in order to prepare data for building a model.

    1) Import data from its text representation presented by DARPA into an MS access database.Numbers of imported records are 438331 records.

    2) Build a query in MS access database and select the required features for building the required model.

    3) Build another query t to remove all duplicate records from selected data.These duplicate data will act as outliers for all other records.

    The remaining records after removing redundant data are 76604 records.

    Now after these steps, the data is ready to be used to build our required model.

    6.2 Building ODBC Connection to Access Database

    Open database connectivity (ODBC) is Microsoft’s strategic interface for accessing data in a heterogeneous environment of relational and non-relational database management systems.Based on the call level interface specification of the SQL access group, ODBC provides an open, vendor-neutral way of accessing data stored in a variety of proprietary personal computers, minicomputers,and mainframe databases.

    An ODBC connection is build over access database to enable SPSS Clementine to connect/retrieve feature vectors.

    6.3 Using Clementine to Generate Model

    As shown in Fig.10, Clementine stream contains the following steps to generate model:

    1) Use created ODBC connection to link to access database and retrieve these data to the data source node.This node is displayed as Node 1 in Fig.10, entitled“IDS_features_table”.

    2) Apply a partition in the path of stream to partition data with 70% to create model and 30% to test model.This node name is called the partition node, Node 2 in Fig.10.

    3) Add the C5.0 classifier node, apply 10% noise to the node to simulate real environment, and use 70% partition of data (from its previous node) to build the classifier.This node name is called TRV-SIKO, Node 3 in Fig.10.

    Fig.10.Steps used in generating Clementine model.

    Fig.11.Decision tree generation procedure.

    4) Run the TRV-SIKO node to generate the model,which is added and connected to the stream and called TRV-SOKSOK, Node 4 in Fig.10.

    5) Add the analysis node, Node 5, to analyze model.

    6) Add the table node, Node 6, to see the model results.

    7) Add the matrix mode, Node 7, to generate confusion matrix of model.

    8) Use the TRV-SOKSOK node to generate the rule set node, Node 8, which is called TRV-SOKSOKRS-RULES.

    NOTE: Each node name in the above Clementine stream steps is the user-defined name (dummy name).

    6.4 Exporting Generated Model to XML File

    Extensible markup language (XML) is a markup language much like HTML.XML was designed to carry data, not to display data.XML is self-descriptive; its tags are not predefined.One must define his own tags.XML is a World Wide Web Consortium (W3C) recommendation.The generated rule set node TRV-SOKSOK in previous section is used to export these rules into XML file.This XML file carries the schema and data of these rules.

    6.5 Using Microsoft Visual Studio Dot Net to Build Rule Converter

    Microsoft Visual Studio Dot Net (VS.NET) is a platform independent and web based extensible language.VS.NET is used to build a C# program as a code generator for VHDL.The C# program takes the generated XML rule set, parse it and then generate the required VHDL code representing these rules.

    6.6 Importing Generated VHDL into Hardware NBIDS

    The generated VHDL from previous step is merged by the NBIDS design.The whole system is compiled and built to generate the VHDL modules.The generated VHDL is taken into Xilinx download tool (Xilinx ISE 9.1i).In order to download the VHDL into FPGA chip, the design must pass through the following download steps: 1) user constraints, 2) synthesizing, 3) translating, 4) mapping, 5)placing, 7) routing step, 8) generating programming file and finally, 9) Downloading design[3],[8],[9].

    7.Performance Evaluation of the Proposed System

    The system as described in Section 5 ran in two clocks.The first clock is the slow lock RX CLK which is the MII sampling clock[6](25 MHz) used to sample data from physical layer, while the other clock is the fast clock (133 MHz), more than five time faster, used in the rest of system blocks.

    7.1 End to End Delay (Frame Enter/Exit Delay)

    The traffic enters/exits the system through the cross connector (Section 5.1).The cross connector block just delays the traffic.There are three slow clocks (25 MHz) in a pipeline fashion.One clock is used for fast receiver blockwith which the data are sampled after two clocks from the rising edge of slow clock (see Fig.5), one clock is used for round buffer enqueue, and the final clock is used for round buffer selector dequeue (see Section 5.1, Fig.4 and Fig.6).So the end to end delay=3×40 ns=120 ns=0.12 ms.This is the only delay added from our system to the packet while traversing our system.

    Table 1: Execution time for classification stages

    7.2 Processing Time

    The processing time is the time taken by our system from receiving the features from TCP/IP up stack (Section 5.2) until a frame is judged if it is normal or attack.All this process is executed by the fast clock (133 MHz) and is divided into three stages as described in Table 1 and as shown in Fig.3.

    Table 1 displays total 26 fast clocks.These clocks are used to classify the packet: either a normal packet or an attack packet.

    7.3 Proposed System Immunity

    Our system is found to be immune against the following attacks.

    Denial of service (DoS) attack:

    This is an attack to the IDS system itself.Sending a very short packet to the inbound and/or outbound directions of the IDS system will cause IDS to give priority to attacked direction over the other, causing the other direction to be open in front of other attacks.

    A.How Did We Face DoS Attacks?

    The current connection selector (CCS) balances the processing between two directions by using the flow chart as shown in Fig.9.This case will never happen as we stated in the above sections.

    Buffer overflow (BOF) attack:

    This attack happens when the system receive a new data to process while it has not finished the current one yet.In this case, the system has to buffer the new data until finishing the current one.Moreover, by increasing traffic,the problem is repeated many times and it is overwhelmed with packets until the buffer is full and the system is crashed.

    B.How Did We Face BOF Attacks?

    As mentioned previously, the total processing time of the system is 26 fast clocks.The minimum frame length determined by IEEE is 64 byte.According to IEEE specification in MII[6], the data is transmitted/received by 25 MHz clock (slow clock), four bits at a time, i.e., to transmit/receive a Byte needs two clocks.So to transmit the shortest frame, 64×2=128 slow clocks are needed.As 128 slow clocks equal 128×5=640 fast clocks (because we process with the fast clock 133 MHz, five times of the receive clock), the gap between any two shortest frames is 640 fast clocks, while we just need 26 clocks to finish classifying the packet to be normal or attack.That is, we will never encounter buffer overflow conditions because we have more than 600 clocks to wait the next frame.Therefore, no buffer is required to be overwhelmed or overflowed.

    7.4 Sensitivity and Specificity Measure for Results

    As the interest in intrusion detection has grown, the topic of evaluation of IDS has also received great attention[14]–[17].Sensitivity and specificity are the statistical measures of the performance of a classification test.Classification measures the mappings from the input value X into the classified value Y.

    The sensitivity (also called recall rate in some fields)measures the proportion of actual positives, which are correctly identified as: Sensitivity =TP/(TP+FN)[18],[19].

    The specificity measures the proportion of negatives,which are correctly identified as: Specificity=TN/(FP+TN)[18],[19].

    Positive predictive value or the precision rate is the proportion of positive test classified correctly: Positive predictive value=TP/(TP + FP)[18],[19].

    Negative predictive value is the proportion of negative test diagnosed correctly: Negative predictive value=TN/(TN + FN)[18],[19].

    Table 2 summarizes the results of measured parameters.

    8.Comparative Study between Software & Hardware IDS

    Software-based IDS runs directly over transport layer,waiting TCP/IP stack of host and carrying the IDS application to extract features from physical layer, data link layer, network layer, and transport layer[20]–[22].The total delay imposed on a software-based IDS traffic passing are three delays:

    1) Receive delay: this delay is wasted in the motion of traffic in the lower layers of TCP/IP stack of host, carrying software-based IDS Down to UP direction.Assuming this delay is only for the first four layers.

    2) Processing delay: this is the delay of the processing inside the IDS system itself.

    3) Transmit delay: this delay is the same as receive delay except for being wasted in transmitting traffic UP to Down in TCP/IP stack.

    The minimum combination for transmit delay or receive delay of running protocols in the first four layers are Ethernet protocol at data link layer, IP protocol at Network layer, and UDP protocol at transport layer.The minimum lengths of these protocols are 14 Byte.The Ethernet header is 20 Byte for IP header without any options or padding while the UDP header is 8 Bytes.Therefore, the minimum delay for any software-based IDS is 42 Bytes (14+20+8=42 Bytes) before starting processing.According to MII, to receive 42 Byte we need 42×2 clocks=84 clocks at each direction (transmit or receive).So thetotal transmit/receive delay is 2×84 =168 clocks (each clock of 25 MHz is 40 ns period).In addition, the minimum transmit delay + receive delay is 168×40=6720 ns=6.72 ms.But our end to end delay is only 0.12 ms.

    Table 2: Sensitivity and specificity results

    9.Conclusion and Future Directions

    In this work, a model and its implementation are introduced for building on-chip IDS which satisfies the requirements of the IDS state-of-the-art.The proposed solution is cheep and applicable according to its minimum requirements.We designed the proposed model solution architecture to satisfy the requirements of the IDS.We show that the proposed solution can be optimized for FPGA implementation.In addition, we introduced performance and accuracy measures of the proposed system.

    The overall system accuracy is 99.93%.We impose 0.12 ms pipeline delays to network traffic.All features extraction and classification are carried out in parallel.Our system is immune against DoS and BOF attacks.

    The presented work is capable of managing any 10100 Mbps Ethernet network.It can serve wireless networks with a little modification of the MAC layer (lower sub-layer of data link layer) to the format of wireless MAC.Using C5.0 gives us a high classification rate and the convenience of implementation by using FPGA.The system can work in a heterogeneous environment independent of operating system or device type as the data source comes as network packets, which are standard.From performance point of view, the software-based IDS has the 56 times (5.72/0.12)delay of our model, making the proposed model to be pioneer in minimum end-to-end delay.

    We implemented FPGA-based network traffic security by using C5.0 decision tree classifier.However, there remain many open issues and future challenges as follows:

    1) Searching for more recent training datasets is important to replace DARPA, which is a little old one.

    2) More features are required to be used in classification process, implementing GMII, XGMII[6]with higher network rates (1 Gbps, 10 Gbps, and 100 Gbps).

    3) Implementing wireless Mac layer is important in adding wireless interface.

    4) Searching more classification methods, not just decision tree, and implementing them over FPGA.

    5) Building more than one classifier in the hardware system and using voting techniques to classify attack.

    6) Enhancing immunity of IDS by solving other types of IDS attacks.In addition, implementing IPv6 protocol stack is an important issue.

    [1]A.K.Rahuman and G.Athisha, “Reconfigurable hardware architecture for network intrusion detection system,”American Journal of Applied Sciences, vol.9, no.10, pp.1618–1624, 2012.

    [2]S.Mühlbach and A.Koch, “NetStage/DPR: A self-reconfiguring platform for active and passive network security operations,” Microprocessors and Microsystems,vol.36, no.8, pp.632–643, 2012.

    [3]J.Singaraju and J.A.Chandy, “FPGA based string matching for network processing applications,”Microprocessors and Microsystems, vol.32 no.4, pp.210–222, 2008.

    [4]S.Bojani, V.Pejovi, G.Caffarena, V.Milovanovi, C.Carreras, and J.Popovi, “User profiling in FPGA for intrusion detection systems,” Ⅰnformation Assurance and Security Letters, vol.1, no.1, pp.12–17, 2010.

    [5]V.P.Sampath, “FPGA based intrusion detection,” World Journal of Science and Technology, vol.1, no.8, pp.100–102, 2011.

    [6]802.3-2005: IEEE Standard for Information technology—Telecommunications and Information Exchange between Systems—Local and Metropolitan Area Networks—Specific requirements Part 3: Carrier Sense Multiple Access with Collision Detection (CSMA/CD) Access Method and Physical Layer Specifications, IEEE Computer Society Sponsored by the LAN/MAN Standards Committee, 2005.

    [7]A.Das, D.Nguyen, J.Zambreno, G.Memik, and A.Choudhary “An FPGA-based network intrusion detection architecture,” ⅠEEE Trans.on Ⅰnformation Forensics and Security, vol.3, no.1, pp.118–132, 2008.

    [8]J.M.B.Serrano and J.H.Palancar, “String alignment pre-detection using unique subsequences for FPGA-based network intrusion detection,” Computer Communications,vol.35, no.6, pp.720–728, 2012.

    [9]T.Katashita, Y.Yamaguchi, A.Maeda, and K.Toda,“FPGA-based intrusion detection system for 10 gigabit Ethernet,” ⅠEⅠCE Trans.Ⅰnf.& Syst., vol.E90–D, no.12, pp.1923–1931, 2007.

    [10]X.Support, Spartan-3A/3AN Starter Kit Board User Guide,Xilinx, 2007.

    [11]C.-M.Chen, Y.-L.Chen, and H.-C.Lin, “An efficient network intrusion detection,” Computer Communications,vol.33, no.4, pp.477–484, 2010.

    [12]H.-J.Liao, C.-H.Richard, Y.-C.Lin, and K.-Y.Tung,“Intrusion detection system: a comprehensive review,”Journal of Network and Computer Applications, vol.36, no.1, pp.16–24, 2013.

    [13]S.Landau and B.S.Everitt, A Handbook Of Statistical Analyses Using SPSS, London: Chapman and Hall/CRC,2nd ed.2006.

    [14]R.P.Lippmann, D.J.Fried, I.Graf, et al., “Evaluating intrusion detection systems: the 1998 DARPA Off-line intrusion detection evaluation,” in Proc.of DARPAⅠnformation Survivability Conf.and Exposition, Los Alamitos, 2000, pp.12–26.

    [15]M.Ranum, “Experiences benchmarking intrusion detection systems,” NFR Security White Paper, 2001.

    [16]R.Lippmann, J.W.Haines, D.J.Fried, J.Korba, and K.Das, “The 1999 DARPA off-line intrusion detection evaluation,” presented at the Second Int.Workshop on Recent Advances in Intrusion Detection, West Lafayette,1999.

    [17]DARPA intrusion detection evaluation.[Online].Available:http://www.ll.mit.edu/mission/communications/cyber/CSTc orpora/ideval/

    [18]N.Ye, The Handbook of Data Mining, Mahwah: Lawrence Erlbaum Associates, 2008.

    [19]Sensitivity and specificity.[Online].Available:http://en.wikipedia.org/wiki/Sensitivity_and_specificity

    [20]M.I.Amer, T.S.Sobh, and G.I.Mohamed, “Using hash table to extract real-time online network traffic features for hardware IDS,” Ⅰnformation Security Journal: A Global Perspective, vol.21, no.1, pp.55–63, 2012.

    [21]T.S.Sobh and Y.Aly, “effective and extensive virtual private network,” Journal of Ⅰnformation Security, vol.2, no.1, pp.39–49, 2011.

    [22]T.S.Sobh and M.I.Amer, “PGP modification for securing digital envelope mail using COM+ and web services,” Ⅰnt.Journal of Network Security, vol.12, no.3, pp.273–285,2011.

    黄色欧美视频在线观看| 九色亚洲精品在线播放| 免费久久久久久久精品成人欧美视频 | 色哟哟·www| 色吧在线观看| 亚洲国产欧美在线一区| 观看av在线不卡| 成人国产麻豆网| 极品人妻少妇av视频| 18在线观看网站| 22中文网久久字幕| 蜜桃国产av成人99| 少妇人妻精品综合一区二区| 日本欧美国产在线视频| 日韩亚洲欧美综合| 男人爽女人下面视频在线观看| 老司机影院成人| 精品人妻熟女av久视频| 国产精品99久久99久久久不卡 | 久久久久久久久久久丰满| 国产精品久久久久久精品古装| 丝瓜视频免费看黄片| 青春草国产在线视频| 亚洲av综合色区一区| 国产精品久久久久久精品古装| 国产精品久久久久久精品古装| 一级a爱视频在线免费观看| 激情视频va一区二区三区| 黄网站色视频无遮挡免费观看| 欧美亚洲日本最大视频资源| 国产高清视频在线播放一区| 亚洲国产欧美网| 搡老熟女国产l中国老女人| 老司机亚洲免费影院| 又紧又爽又黄一区二区| 天天躁夜夜躁狠狠躁躁| 不卡一级毛片| 午夜福利视频在线观看免费| 精品国产一区二区三区四区第35| 日韩视频在线欧美| 亚洲精品久久成人aⅴ小说| 99re6热这里在线精品视频| 在线观看免费视频网站a站| 欧美老熟妇乱子伦牲交| 欧美午夜高清在线| 在线观看免费视频网站a站| 欧美黑人精品巨大| 日韩精品免费视频一区二区三区| 亚洲第一青青草原| 91字幕亚洲| 免费看a级黄色片| 黄色 视频免费看| 国产精品99久久99久久久不卡| 不卡av一区二区三区| 欧美人与性动交α欧美软件| 亚洲精品国产区一区二| 亚洲国产欧美日韩在线播放| 日本欧美视频一区| 久久精品熟女亚洲av麻豆精品| 午夜福利,免费看| 国产精品.久久久| 最近最新中文字幕大全免费视频| 中国美女看黄片| 香蕉国产在线看| 国产单亲对白刺激| www.精华液| 久久热在线av| 免费在线观看日本一区| av免费在线观看网站| av免费在线观看网站| 老汉色∧v一级毛片| 欧美日韩av久久| 精品亚洲乱码少妇综合久久| 国产一卡二卡三卡精品| 亚洲九九香蕉| 99riav亚洲国产免费| 99热网站在线观看| 久久青草综合色| 黄色毛片三级朝国网站| 我要看黄色一级片免费的| 女性被躁到高潮视频| 国产日韩欧美视频二区| 人人妻,人人澡人人爽秒播| 宅男免费午夜| 老司机影院毛片| 制服诱惑二区| 久久久国产一区二区| 啦啦啦视频在线资源免费观看| 欧美 亚洲 国产 日韩一| 国产精品久久久久久精品电影小说| 国产日韩欧美视频二区| 亚洲国产欧美日韩在线播放| 波多野结衣av一区二区av| 悠悠久久av| 亚洲少妇的诱惑av| 少妇被粗大的猛进出69影院| 男女下面插进去视频免费观看| 欧美日韩福利视频一区二区| 午夜激情久久久久久久| 午夜日韩欧美国产| 精品国产超薄肉色丝袜足j| 啦啦啦免费观看视频1| 国产xxxxx性猛交| 亚洲av日韩精品久久久久久密| 国产欧美亚洲国产| 国产欧美亚洲国产| 嫁个100分男人电影在线观看| 91国产中文字幕| 黄色视频,在线免费观看| 交换朋友夫妻互换小说| 这个男人来自地球电影免费观看| 久久精品91无色码中文字幕| 国产1区2区3区精品| 欧美另类亚洲清纯唯美| 亚洲av片天天在线观看| 12—13女人毛片做爰片一| 久热这里只有精品99| 天堂中文最新版在线下载| 一区二区av电影网| 久久99热这里只频精品6学生| 中文亚洲av片在线观看爽 | 亚洲精品国产色婷婷电影| 国产精品一区二区在线不卡| 久久久国产一区二区| 在线播放国产精品三级| 亚洲欧美日韩高清在线视频 | 热99久久久久精品小说推荐| 日韩视频一区二区在线观看| 国产三级黄色录像| 亚洲午夜精品一区,二区,三区| 亚洲欧洲日产国产| 国产激情久久老熟女| 国产aⅴ精品一区二区三区波| 我要看黄色一级片免费的| 免费少妇av软件| 久久久久久久精品吃奶| 久久久久国产一级毛片高清牌| 一区二区三区国产精品乱码| 亚洲专区中文字幕在线| 国产一区二区激情短视频| 露出奶头的视频| 精品免费久久久久久久清纯 | 99国产精品一区二区蜜桃av | 男女边摸边吃奶| 精品福利永久在线观看| 91国产中文字幕| 欧美日韩一级在线毛片| 久久人妻av系列| 91精品国产国语对白视频| a在线观看视频网站| 狠狠精品人妻久久久久久综合| 新久久久久国产一级毛片| 亚洲美女黄片视频| 黄片小视频在线播放| av网站免费在线观看视频| av又黄又爽大尺度在线免费看| 丰满少妇做爰视频| 免费一级毛片在线播放高清视频 | 动漫黄色视频在线观看| 亚洲国产看品久久| 免费观看av网站的网址| 精品国产一区二区久久| 啦啦啦在线免费观看视频4| 悠悠久久av| 亚洲av美国av| 超色免费av| 国产激情久久老熟女| 欧美日韩精品网址| 国产在线一区二区三区精| 蜜桃在线观看..| 久久精品国产亚洲av高清一级| 十八禁人妻一区二区| 久久久久久亚洲精品国产蜜桃av| 久久国产亚洲av麻豆专区| 国产精品免费视频内射| 久热这里只有精品99| 久久精品成人免费网站| 大码成人一级视频| 丰满人妻熟妇乱又伦精品不卡| 日日摸夜夜添夜夜添小说| 久久青草综合色| 免费日韩欧美在线观看| 日本欧美视频一区| 久久久久久久久久久久大奶| 亚洲第一欧美日韩一区二区三区 | 久久久久久久国产电影| 女性生殖器流出的白浆| 国产色视频综合| 多毛熟女@视频| 欧美激情久久久久久爽电影 | 天天添夜夜摸| 18禁黄网站禁片午夜丰满| 怎么达到女性高潮| 久热爱精品视频在线9| avwww免费| 香蕉丝袜av| 性少妇av在线| 女人爽到高潮嗷嗷叫在线视频| 国产男靠女视频免费网站| 成在线人永久免费视频| bbb黄色大片| 中文字幕最新亚洲高清| 国产精品亚洲一级av第二区| 大型黄色视频在线免费观看| 一本一本久久a久久精品综合妖精| 亚洲精品自拍成人| 午夜久久久在线观看| 国产老妇伦熟女老妇高清| 日韩视频在线欧美| 狠狠婷婷综合久久久久久88av| 国产欧美日韩一区二区精品| 亚洲第一欧美日韩一区二区三区 | 啦啦啦视频在线资源免费观看| 一本一本久久a久久精品综合妖精| 亚洲精品国产精品久久久不卡| 免费观看av网站的网址| 国产色视频综合| 国产高清videossex| 一边摸一边抽搐一进一出视频| 久久国产精品男人的天堂亚洲| 久久中文看片网| 久久av网站| 国产成人影院久久av| 2018国产大陆天天弄谢| 久久精品亚洲熟妇少妇任你| 午夜免费成人在线视频| 99国产综合亚洲精品| 老司机午夜十八禁免费视频| 一本久久精品| 午夜精品国产一区二区电影| 他把我摸到了高潮在线观看 | 久久这里只有精品19| av天堂久久9| 少妇猛男粗大的猛烈进出视频| 一边摸一边抽搐一进一出视频| 国产野战对白在线观看| 久久久久久久久久久久大奶| 99精品在免费线老司机午夜| 久久中文看片网| e午夜精品久久久久久久| 日韩中文字幕欧美一区二区| 丝袜美腿诱惑在线| 日日爽夜夜爽网站| 久久天堂一区二区三区四区| 日韩大片免费观看网站| 老熟妇乱子伦视频在线观看| 嫩草影视91久久| 欧美日韩亚洲综合一区二区三区_| 精品久久蜜臀av无| 午夜激情av网站| kizo精华| 亚洲一卡2卡3卡4卡5卡精品中文| av又黄又爽大尺度在线免费看| 亚洲精品av麻豆狂野| 国产精品影院久久| 露出奶头的视频| 国产精品久久久久久人妻精品电影 | 日韩制服丝袜自拍偷拍| 美女高潮到喷水免费观看| 最新的欧美精品一区二区| 别揉我奶头~嗯~啊~动态视频| 看免费av毛片| 天天影视国产精品| 成人黄色视频免费在线看| 久久国产亚洲av麻豆专区| 搡老岳熟女国产| 一区二区三区精品91| 国产99久久九九免费精品| 日韩免费av在线播放| 91精品三级在线观看| 亚洲av国产av综合av卡| 久久99热这里只频精品6学生| 欧美精品高潮呻吟av久久| 国产黄色免费在线视频| 久久青草综合色| 一级黄色大片毛片| 亚洲精品一二三| 亚洲精华国产精华精| 99国产精品一区二区蜜桃av | 午夜视频精品福利| 男人舔女人的私密视频| 一进一出好大好爽视频| 久久久久精品人妻al黑| 精品一区二区三区四区五区乱码| 色婷婷久久久亚洲欧美| 黄片小视频在线播放| 国产精品秋霞免费鲁丝片| 五月天丁香电影| 十八禁网站网址无遮挡| bbb黄色大片| 美女高潮喷水抽搐中文字幕| 大香蕉久久网| 法律面前人人平等表现在哪些方面| 久久久久久久国产电影| 岛国毛片在线播放| 少妇被粗大的猛进出69影院| 高清毛片免费观看视频网站 | 亚洲中文字幕日韩| 人人妻人人澡人人爽人人夜夜| 亚洲伊人久久精品综合| 五月天丁香电影| 国产不卡av网站在线观看| 久久国产精品男人的天堂亚洲| 精品久久久精品久久久| 国产免费福利视频在线观看| 亚洲精品粉嫩美女一区| 亚洲全国av大片| 国产成人精品在线电影| 人成视频在线观看免费观看| 欧美人与性动交α欧美精品济南到| 国产97色在线日韩免费| 一本大道久久a久久精品| 99在线人妻在线中文字幕 | 国产精品一区二区在线不卡| 精品人妻在线不人妻| 亚洲精品乱久久久久久| 纯流量卡能插随身wifi吗| 久久久久久久久久久久大奶| 下体分泌物呈黄色| 亚洲av欧美aⅴ国产| 亚洲欧美一区二区三区久久| 在线十欧美十亚洲十日本专区| 丁香六月天网| 国产无遮挡羞羞视频在线观看| 日韩欧美免费精品| 男女下面插进去视频免费观看| 精品国产一区二区三区四区第35| 一二三四社区在线视频社区8| 99热国产这里只有精品6| 国产亚洲午夜精品一区二区久久| 搡老熟女国产l中国老女人| av在线播放免费不卡| 精品久久久久久电影网| 国产成人av激情在线播放| 两性午夜刺激爽爽歪歪视频在线观看 | 老司机深夜福利视频在线观看| 精品国产一区二区三区四区第35| 亚洲一卡2卡3卡4卡5卡精品中文| 欧美精品啪啪一区二区三区| 他把我摸到了高潮在线观看 | 王馨瑶露胸无遮挡在线观看| 欧美日韩精品网址| 亚洲中文字幕日韩| 国产精品九九99| 久久久久国产一级毛片高清牌| 王馨瑶露胸无遮挡在线观看| 丝瓜视频免费看黄片| 一边摸一边抽搐一进一小说 | 国产精品国产高清国产av | 视频区欧美日本亚洲| 高清av免费在线| 日韩免费av在线播放| 狠狠婷婷综合久久久久久88av| 午夜91福利影院| 99在线人妻在线中文字幕 | 九色亚洲精品在线播放| videosex国产| 国产精品久久电影中文字幕 | 亚洲国产av新网站| 黑丝袜美女国产一区| 午夜福利,免费看| 国产熟女午夜一区二区三区| 高清av免费在线| 国产单亲对白刺激| 九色亚洲精品在线播放| 日韩欧美三级三区| 国产成人一区二区三区免费视频网站| 成人特级黄色片久久久久久久 | 女警被强在线播放| 国产日韩欧美视频二区| 久久99一区二区三区| 日日摸夜夜添夜夜添小说| 在线永久观看黄色视频| 亚洲人成伊人成综合网2020| 777久久人妻少妇嫩草av网站| 色94色欧美一区二区| 别揉我奶头~嗯~啊~动态视频| 国产精品一区二区精品视频观看| 一个人免费在线观看的高清视频| 91老司机精品| 一区二区日韩欧美中文字幕| 一区二区av电影网| 亚洲专区字幕在线| 两个人免费观看高清视频| 99riav亚洲国产免费| av国产精品久久久久影院| 丝瓜视频免费看黄片| 最近最新中文字幕大全免费视频| 色婷婷久久久亚洲欧美| 色精品久久人妻99蜜桃| 一级a爱视频在线免费观看| 午夜福利在线观看吧| 黄色视频在线播放观看不卡| 电影成人av| 亚洲五月色婷婷综合| 亚洲精品自拍成人| 老汉色∧v一级毛片| 欧美成狂野欧美在线观看| 婷婷成人精品国产| 成人黄色视频免费在线看| 欧美 日韩 精品 国产| 国产精品成人在线| 国产成人欧美| 国产国语露脸激情在线看| 男人舔女人的私密视频| 18禁裸乳无遮挡动漫免费视频| 波多野结衣av一区二区av| 亚洲第一欧美日韩一区二区三区 | 亚洲国产av新网站| 欧美精品高潮呻吟av久久| 自拍欧美九色日韩亚洲蝌蚪91| 久久精品熟女亚洲av麻豆精品| 国产精品 欧美亚洲| 80岁老熟妇乱子伦牲交| 久久久久久久久免费视频了| 男女床上黄色一级片免费看| 日日爽夜夜爽网站| 久久中文字幕一级| 午夜激情av网站| 丝袜人妻中文字幕| 国产成人欧美| 亚洲伊人久久精品综合| 久久狼人影院| 久久午夜综合久久蜜桃| 十八禁网站网址无遮挡| 9191精品国产免费久久| 十八禁网站网址无遮挡| 中文字幕色久视频| 亚洲欧美日韩另类电影网站| 久热这里只有精品99| 汤姆久久久久久久影院中文字幕| 国产高清视频在线播放一区| 午夜福利乱码中文字幕| 亚洲人成电影免费在线| 欧美精品啪啪一区二区三区| 视频区欧美日本亚洲| 国产单亲对白刺激| 亚洲午夜精品一区,二区,三区| 国产一区二区三区综合在线观看| 亚洲成a人片在线一区二区| 丰满少妇做爰视频| 一进一出好大好爽视频| 老司机午夜福利在线观看视频 | 亚洲精品国产色婷婷电影| 在线观看免费视频日本深夜| 老司机影院毛片| 欧美中文综合在线视频| 丝瓜视频免费看黄片| 电影成人av| 91九色精品人成在线观看| 精品少妇黑人巨大在线播放| 操出白浆在线播放| 精品福利观看| 久久精品人人爽人人爽视色| av片东京热男人的天堂| 在线观看免费视频日本深夜| av一本久久久久| 国产精品免费视频内射| 久久99一区二区三区| 国产成+人综合+亚洲专区| 美女高潮到喷水免费观看| 亚洲情色 制服丝袜| 人妻一区二区av| www.精华液| 天天影视国产精品| 国产精品秋霞免费鲁丝片| 国产男靠女视频免费网站| 久久久国产一区二区| 国产精品免费一区二区三区在线 | 亚洲国产欧美网| 国产福利在线免费观看视频| 激情视频va一区二区三区| 午夜老司机福利片| 在线观看一区二区三区激情| 大片电影免费在线观看免费| 国产精品二区激情视频| 亚洲精品av麻豆狂野| 亚洲中文av在线| 久久99热这里只频精品6学生| 国产伦理片在线播放av一区| 欧美另类亚洲清纯唯美| 我的亚洲天堂| av电影中文网址| 天天添夜夜摸| av电影中文网址| 天天添夜夜摸| 9热在线视频观看99| 久久性视频一级片| 新久久久久国产一级毛片| 国产激情久久老熟女| 99re6热这里在线精品视频| 欧美日韩国产mv在线观看视频| 电影成人av| 成人av一区二区三区在线看| 精品久久蜜臀av无| 深夜精品福利| 一区二区三区乱码不卡18| 午夜福利在线观看吧| 999久久久国产精品视频| 婷婷丁香在线五月| 免费在线观看完整版高清| 王馨瑶露胸无遮挡在线观看| 久久免费观看电影| 亚洲全国av大片| 高清av免费在线| 精品少妇黑人巨大在线播放| 欧美人与性动交α欧美软件| 国产精品偷伦视频观看了| 老汉色∧v一级毛片| 一本色道久久久久久精品综合| 欧美老熟妇乱子伦牲交| 欧美乱码精品一区二区三区| 视频在线观看一区二区三区| 三上悠亚av全集在线观看| av网站在线播放免费| 午夜福利,免费看| 国产亚洲精品一区二区www | 成年女人毛片免费观看观看9 | 国产有黄有色有爽视频| 欧美精品亚洲一区二区| 久久久久网色| 亚洲精品一二三| 久久人妻福利社区极品人妻图片| 搡老乐熟女国产| 国产精品国产av在线观看| 少妇的丰满在线观看| 999精品在线视频| 欧美精品一区二区免费开放| 亚洲精品国产区一区二| 别揉我奶头~嗯~啊~动态视频| 久久99热这里只频精品6学生| 国产深夜福利视频在线观看| 高清毛片免费观看视频网站 | 两个人免费观看高清视频| 人人澡人人妻人| 99精国产麻豆久久婷婷| 国产精品99久久99久久久不卡| 波多野结衣一区麻豆| 日韩视频在线欧美| 日日摸夜夜添夜夜添小说| 欧美精品人与动牲交sv欧美| 嫩草影视91久久| 黑人猛操日本美女一级片| 亚洲av电影在线进入| 精品少妇一区二区三区视频日本电影| 国产成人一区二区三区免费视频网站| 少妇被粗大的猛进出69影院| 大片免费播放器 马上看| 国产黄色免费在线视频| 极品少妇高潮喷水抽搐| 国产精品欧美亚洲77777| 久久久国产精品麻豆| 又紧又爽又黄一区二区| 久久这里只有精品19| 国产欧美日韩一区二区三| 亚洲欧美一区二区三区久久| 最近最新中文字幕大全免费视频| 一级a爱视频在线免费观看| 国产在线视频一区二区| 亚洲一码二码三码区别大吗| 在线十欧美十亚洲十日本专区| cao死你这个sao货| 欧美日韩国产mv在线观看视频| www日本在线高清视频| 一区福利在线观看| av一本久久久久| 男女床上黄色一级片免费看| 久久99热这里只频精品6学生| 国产午夜精品久久久久久| 真人做人爱边吃奶动态| www.999成人在线观看| 黄色毛片三级朝国网站| 国产成人精品在线电影| 一边摸一边抽搐一进一出视频| 国产精品偷伦视频观看了| 一级黄色大片毛片| 久久精品亚洲av国产电影网| 国产精品影院久久| 高清av免费在线| 蜜桃在线观看..| 精品国内亚洲2022精品成人 | 精品国产超薄肉色丝袜足j| 99久久国产精品久久久| 国产在线观看jvid| www.精华液| 欧美黑人欧美精品刺激| 免费在线观看日本一区| 黑丝袜美女国产一区| 五月天丁香电影| 亚洲黑人精品在线| 一二三四在线观看免费中文在| 桃红色精品国产亚洲av| 老熟妇仑乱视频hdxx| 别揉我奶头~嗯~啊~动态视频| 欧美黑人精品巨大| 丰满少妇做爰视频| 制服诱惑二区| 国产主播在线观看一区二区| 真人做人爱边吃奶动态| 嫁个100分男人电影在线观看| 搡老岳熟女国产| 热re99久久国产66热| 在线观看免费日韩欧美大片| 国产一区有黄有色的免费视频| 国产av国产精品国产| 国产黄色免费在线视频| 免费少妇av软件| 国产成人精品久久二区二区免费| 在线观看免费日韩欧美大片| 99re在线观看精品视频| 成人精品一区二区免费| 国产成人精品无人区| 日韩欧美国产一区二区入口| 9色porny在线观看| 男女之事视频高清在线观看|