Open Access
Subscription or Fee Access
FPGA Based Multi-Tier Artificial Neural Network Processor for Firewall Implementation
Vinod G. Shelake, Santosh A. Shinde, Rajanish K. Kamat
Abstract
Artificial intelligence (AI) tools, such as expert system, fuzzy logic, and neural network are likely to usher a new era in computer security and intrusion detection in the coming decades. Although these technologies have advanced significantly in recent years and have found wide applications, they have hardly penetrated in the areas of computer security mainly due to lack of interdisciplinary framework amongst the mathematicians, cyber experts and Very Large Scale Integration (VLSI) engineers specialized in the areas of reconfigurable soft computing platforms such as field programmable gate arrays (FPGA). The present paper showcases usefulness of the mathematized methodology for drawing inferences about the world from uncertain knowledge, such as the ever-changing hacking patterns posing grave security threats. The core theoretical principles for the implementation of firewall are derived from the well established mathematical concepts such as entropy and probability. FPGA based platform is used for realization of the multi-tier ANN processor for getting computational efficiency and less latency besides inculcation of the human expert intelligence. The novel features of the implemented semi custom Application Specific Integrated Circuit (ASIC) are parallelism, background processing and predicative output that decides whether to allow or deny the ongoing session between two hosts. Handel C based coding is adopted for C to Register Transfer Logic (RTL) conversion so as to get the advantages such as an early development cycle, ease of algorithmic expressions and fast prototyping. The paper also presents the main rationale behind application of Artificial Neural Network for firewall applications, formulation of the mathematical model and its subsequent coding to realize the device in FPGA paradigm.
Keywords
Artificial Neural Network, Firewall, back propagation algorithm, Handel C, Intrusion Detection, entropy
Full Text:
PDF
Refbacks
- There are currently no refbacks.
Disclaimer/Regarding indexing issue:
We have provided the online access of all issues and papers to the indexing agencies (as given on journal web site). It’s depend on indexing agencies when, how and what manner they can index or not. Hence, we like to inform that on the basis of earlier indexing, we can’t predict the today or future indexing policy of third party (i.e. indexing agencies) as they have right to discontinue any journal at any time without prior information to the journal. So, please neither sends any question nor expects any answer from us on the behalf of third party i.e. indexing agencies.Hence, we will not issue any certificate or letter for indexing issue. Our role is just to provide the online access to them. So we do properly this and one can visit indexing agencies website to get the authentic information.