Abstract
Security is of paramount importance in computer networks; in fact network attacks may cause huge economic damages as shown by the fluctuations of stocks of firms subjected to cyber-attacks. For this reason network traffic needs to be purged of malicious traffic before getting to the destination. At the same time the next generation of routers will be able to modulate energy consumption on the basis of actual traffic, thus it would be beneficial to identify and discard malicious packets as soon as possible. In past works, the energy savings enabled by aggressive intrusion detection has been modeled and analyzed, however past model do not take into account the fact that the load of routers diminishes their capability to analyze packets. In this paper we introduce an adaptive model that takes into account the actual load of routers. The model is implemented in a simulator and we show the results of simulations proving that the actual level of energy saving depends upon the network load.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Telang, R., Wattal, S.: An Empirical Analysis of the Impact of Software Vulnerability Announcements on Firm Stock Price. IEEE Transactions on Software Engineering 33(8), 544–557 (2007), doi:10.1109/TSE.2007.70712
Tsai, C.-F., Hsu, Y.-F., Lin, C.-Y., Lin, W.-Y.: Intrusion detection by machine learning: A review. Expert Systems with Applications 36(10), 11994–12000 (2009)
Mehra, P.: A brief study and comparison of Snort and Bro Open Source Network Intrusion Detection Systems. International Journal of Advanced Research in Computer and Communication Engineering 1(6) (August 2012)
White, J.S., Fitzsimmons, T.T., Matthews, J.N.: Quantitative Analysis of Intrusion Detection Systems: Snort and Suricata. In: Proc. of the SPIE, vol. 8757 (2013)
Prelude IDS, https://www.prelude-ids.org
Pihelgas, M.: A Comparative Analysis of Open-Source Intrusion Detection Systems, Ms. Thesis, University of Tallin (2012)
Bolla, R., Bruschi, R., Ranieri, A.: Green support for PC-based software router: Performance evaluation and modeling. In: Proc. IEEE International Conference on Communication, ICC 2009, pp. 1–6 (2009)
Forrest, S., Hofmeyr, S.A., Somayaji, A.: Computer Immnology. Communications of the ACM 40(10), 88–96 (1997)
Koch, R.: Towards next-generation Intrusion Detection. In: Proc. of the 3rd International Conference on Cyber Conflicts (ICCC), pp. 1–18 (2011)
Akamai, The State of the Internet. Tech. Rep., 3Q (2013)
Callegari, C., Giordano, S., Pagano, M.: New statistical approaches for anomaly detection. Security and Communication Networks 2(6), 611–634 (2009)
Kim, J., Bentley, P.J., Aickelin, U., Greensmith, J., Tedesco, G., Twycoss, J.: Immune system approaches to intrusion detection: a review. Journal: Natural Computing 6(4), 413–466 (2007)
Li, W.: Using Genetic Algorithm for Network Intrusion Detection. In: Proc. of DOE Cyber Security Group (2004)
Migliardi, M., Merlo, A.: Improving energy efficiency in Distributed Intrusion Detection Systems. Journal of High Speed Networks 9(3), 251–264 (2013)
Caviglione, L., Merlo, A., Migliardi, M.: What is Green Security? In: Proc. of the 7th International Conference on Information Assurance and Security (IAS 2011), pp. 366–371 (2011)
Pantazis, N.A., Nikolidakis, S.A., Vergados, D.D.: Energy-Efficient Routing Protocols in Wireless Sensor Networks: A Survey. IEEE Communications Surveys and Tutorials 5(2), 551–591 (2013)
Li, X., Chong, F.T.: A Case for Energy-Aware Security Mechanisms. In: Proc. of the 27th International Conference on Advanced Information Networking and Applications Workshops, pp. 1541–1546
Albin, E.: A Comparative Analysis of the Snort and Suricata intrusion-detection systems. Master Thesis (September 2011)
Herrero, A., Zurutuza, U., Corchado, E.: A neural-visualization ids for honeynet data. The International Journal of Neural Systems 22(2)
Herrero, A., Navarro, M., Corchado, E., Julian, V.: RT-MOVICAB-IDS: Addressing real-time intrusion detection. Future Generation Comp. Syst. 29(1), 250–261 (2013)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Merlo, A., Migliardi, M., Raso, D., Spadacini, E. (2014). Optimizing Network Energy Consumption through Intrusion Prevention Systems. In: de la Puerta, J., et al. International Joint Conference SOCO’14-CISIS’14-ICEUTE’14. Advances in Intelligent Systems and Computing, vol 299. Springer, Cham. https://doi.org/10.1007/978-3-319-07995-0_50
Download citation
DOI: https://doi.org/10.1007/978-3-319-07995-0_50
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-07994-3
Online ISBN: 978-3-319-07995-0
eBook Packages: EngineeringEngineering (R0)