Using a Cluster for Securing Embedded Systems
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2016, Vol 7, Issue 9
Abstract
In today's increasingly interconnected world, the deployment of an Intrusion Detection System (IDS) is becoming very important for securing embedded systems from viruses, worms, attacks, etc. But IDSs face many challenges like computational resources and ubiquitous threats. Many of these challenges can be resolved by running the IDS in a cluster to allow tasks to be parallelly executed. In this paper, we propose to secure embedded systems by using a cluster of embedded cards that can run multiple instances of an IDS in a parallel way. This proposition is now possible with the availability of new low-power single-board computers (Raspberry Pi, BeagleBoard, Cubieboard, Galileo, etc.). To test the feasibility of our proposed architecture, we run two instances of the Bro IDS on two Raspberry Pi. The results show that we can effectively run multiple instances of an IDS in a parallel way on a cluster of new low-power single-board computers to secure embedded systems.
Authors and Affiliations
Mohamed LMIMOUNI, Khalid BOUKHDIR, Hicham MEDROMI, Siham BENHADOU
Biometrics Recognition based on Image Local Features Ordinal Encoding
In the present informational era, with the continue extension of embedded computing systems, the demand of faster and robust image descriptors is an important issue. However, image representation and recognition is an op...
Hyperspectral Image Classification using Support Vector Machine with Guided Image Filter
Hyperspectral images are used to identify and detect the objects on the earth’s surface. Classifying of these hyperspectral images is becoming a difficult task, due to more number of spectral bands. These high dimensiona...
The Parents' Perception of Nursing Support in their Neonatal Intensive Care Unit (NICU) Experience
NICU is an environment that has many challenges in information receiving and understanding. The infants that are cared for might have serious and complex medical problems. For Parents the NICU experience is filled with s...
Test Case Reduction Techniques - Survey
Regression testing is considered to be the most expensive phase in software testing. Therefore, regression testing reduction eliminates the redundant test cases in the regression testing suite and saves cost of this phas...
Mining Trending Hash Tags for Arabic Sentiment Analysis
People text millions of posts everyday on microblogging social networking especially Twitter which make microblogs a rich source for public opinions, customer’s comments and reviews. Companies and public sectors are look...