Title :
Data De-duplication and Event Processing for Security Applications on an Embedded Processor
Author :
Nagarajaiah, H. ; Upadhyaya, S. ; Gopal, Viji
Author_Institution :
Comput. Sci. & Eng., Univ. at Buffalo Buffalo, Buffalo, NY, USA
Abstract :
Network security schemes generally deploy sensors and other network devices which generate huge volumes of data, overwhelming the underlying decision making algorithms. An example is corporate networks employing intrusion detection systems where there is a deluge of alert data, confounding the computations involved in sensor information fusion and alert correlation. One way to obtain fast and real-time responses is to preprocess such data to manageable sizes. In this paper, we show that data de-duplication using computationally efficient fingerprinting algorithms can provide real-time results. We present an algorithm which utilizes Rabin Fingerprinting/hashing scheme for the purpose of data de-duplication. We have implemented this algorithm on Intel Atom, which is a powerful, energy efficient embedded processor. Our study is intended to show that the relatively low performing embedded processors are capable of providing the needed computational support if they were to handle security functions in the field. When compared to the algorithmic performance on a high end system, viz. Intel Core 2 Duo processor, the positive results obtained make a case for using the Atom processor in networked applications employing mobile devices.
Keywords :
cryptography; decision making; embedded systems; microprocessor chips; sensor fusion; Atom processor; Intel Atom; Intel Core 2 duo processor; Rabin fingerprinting scheme; alert correlation; alert data; algorithmic performance; computational support; computationally efficient fingerprinting algorithms; corporate networks; data deduplication; decision making algorithms; energy efficient embedded processor; event processing; fast response; handle security functions; hashing scheme; high end system; intrusion detection systems; low performing embedded processors; mobile devices; network devices; network security schemes; networked applications; real-time response; security applications; sensor information fusion; Algorithm design and analysis; Correlation; Fingerprint recognition; Instruction sets; Polynomials; Real-time systems; Security; Alert correlation; Embedded processors; Fingerprinting; Mobile devices; Redundancy;
Conference_Titel :
Reliable Distributed Systems (SRDS), 2012 IEEE 31st Symposium on
Conference_Location :
Irvine, CA
Print_ISBN :
978-1-4673-2397-0
DOI :
10.1109/SRDS.2012.18