Author:
Deyannis Dimitris,Papadogiannaki Eva,Chrysos Grigorios,Georgopoulos Konstantinos,Ioannidis Sotiris
Abstract
Despite the tremendous socioeconomic importance of supply chains (SCs), security officers and operators are faced with no easy and integrated way for protecting their critical, and interconnected, infrastructures from cyber-attacks. As a result, solutions and methodologies that support the detection of malicious activity on SCs are constantly researched into and proposed. Hence, this work presents the implementation of a low-cost reconfigurable intrusion detection system (IDS), on the edge, that can be easily integrated into SC networks, thereby elevating the featured levels of security. Specifically, the proposed system offers real-time cybersecurity intrusion detection over high-speed networks and services by offloading elements of the security check workloads on dedicated reconfigurable hardware. Our solution uses a novel framework that implements the Aho–Corasick algorithm on the reconfigurable fabric of a multi-processor system-on-chip (MPSoC), which supports parallel matching for multiple network packet patterns. The initial performance evaluation of this proof-of-concept shows that it holds the potential to outperform existing software-based solutions while unburdening SC nodes from demanding cybersecurity check workloads. The proposed system performance and its efficiency were evaluated using a real-life environment in the context of European Union’s Horizon 2020 research and innovation program, i.e., CYRENE.
Subject
Electrical and Electronic Engineering,Computer Networks and Communications,Hardware and Architecture,Signal Processing,Control and Systems Engineering
Reference56 articles.
1. CYRENE EU H2020 Project
https://www.cyrene.eu
2. A critical balance: collaboration and security in the IT-enabled supply chain
3. Cybersecurity in ICT Supply Chains: Key Challenges and a Relevant Architecture
4. What is Supply Chain Security?
https://www.ibm.com/blogs/supply-chain/what-is-supply-chain-security/
5. Why Securing Your Supply Chain Should Be Top Priority
https://www.accenture.com/nl-en/blogs/insights/supply-chain-security
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A Reconfigurable IDS Framework for Encrypted and Non-Encrypted Network Data in Supply Chains;2023 International Conference on Engineering and Emerging Technologies (ICEET);2023-10-27