Optimizing Network Energy Consumption through Intrusion Prevention Systems

Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 299)


Security is of paramount importance in computer networks; in fact network attacks may cause huge economic damages as shown by the fluctuations of stocks of firms subjected to cyber-attacks. For this reason network traffic needs to be purged of malicious traffic before getting to the destination. At the same time the next generation of routers will be able to modulate energy consumption on the basis of actual traffic, thus it would be beneficial to identify and discard malicious packets as soon as possible. In past works, the energy savings enabled by aggressive intrusion detection has been modeled and analyzed, however past model do not take into account the fact that the load of routers diminishes their capability to analyze packets. In this paper we introduce an adaptive model that takes into account the actual load of routers. The model is implemented in a simulator and we show the results of simulations proving that the actual level of energy saving depends upon the network load.


Energy Saving Intrusion Detection Time Slice Packet Delay Intrusion Detection System 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Telang, R., Wattal, S.: An Empirical Analysis of the Impact of Software Vulnerability Announcements on Firm Stock Price. IEEE Transactions on Software Engineering 33(8), 544–557 (2007), doi:10.1109/TSE.2007.70712Google Scholar
  2. 2.
    Tsai, C.-F., Hsu, Y.-F., Lin, C.-Y., Lin, W.-Y.: Intrusion detection by machine learning: A review. Expert Systems with Applications 36(10), 11994–12000 (2009)CrossRefGoogle Scholar
  3. 3.
    Mehra, P.: A brief study and comparison of Snort and Bro Open Source Network Intrusion Detection Systems. International Journal of Advanced Research in Computer and Communication Engineering 1(6) (August 2012)Google Scholar
  4. 4.
    White, J.S., Fitzsimmons, T.T., Matthews, J.N.: Quantitative Analysis of Intrusion Detection Systems: Snort and Suricata. In: Proc. of the SPIE, vol. 8757 (2013)Google Scholar
  5. 5.
  6. 6.
    Pihelgas, M.: A Comparative Analysis of Open-Source Intrusion Detection Systems, Ms. Thesis, University of Tallin (2012)Google Scholar
  7. 7.
    Bolla, R., Bruschi, R., Ranieri, A.: Green support for PC-based software router: Performance evaluation and modeling. In: Proc. IEEE International Conference on Communication, ICC 2009, pp. 1–6 (2009)Google Scholar
  8. 8.
    Forrest, S., Hofmeyr, S.A., Somayaji, A.: Computer Immnology. Communications of the ACM 40(10), 88–96 (1997)CrossRefGoogle Scholar
  9. 9.
    Koch, R.: Towards next-generation Intrusion Detection. In: Proc. of the 3rd International Conference on Cyber Conflicts (ICCC), pp. 1–18 (2011)Google Scholar
  10. 10.
    Akamai, The State of the Internet. Tech. Rep., 3Q (2013)Google Scholar
  11. 11.
    Callegari, C., Giordano, S., Pagano, M.: New statistical approaches for anomaly detection. Security and Communication Networks 2(6), 611–634 (2009)Google Scholar
  12. 12.
    Kim, J., Bentley, P.J., Aickelin, U., Greensmith, J., Tedesco, G., Twycoss, J.: Immune system approaches to intrusion detection: a review. Journal: Natural Computing 6(4), 413–466 (2007)zbMATHGoogle Scholar
  13. 13.
    Li, W.: Using Genetic Algorithm for Network Intrusion Detection. In: Proc. of DOE Cyber Security Group (2004)Google Scholar
  14. 14.
    Migliardi, M., Merlo, A.: Improving energy efficiency in Distributed Intrusion Detection Systems. Journal of High Speed Networks 9(3), 251–264 (2013)Google Scholar
  15. 15.
    Caviglione, L., Merlo, A., Migliardi, M.: What is Green Security? In: Proc. of the 7th International Conference on Information Assurance and Security (IAS 2011), pp. 366–371 (2011)Google Scholar
  16. 16.
    Pantazis, N.A., Nikolidakis, S.A., Vergados, D.D.: Energy-Efficient Routing Protocols in Wireless Sensor Networks: A Survey. IEEE Communications Surveys and Tutorials 5(2), 551–591 (2013)CrossRefGoogle Scholar
  17. 17.
    Li, X., Chong, F.T.: A Case for Energy-Aware Security Mechanisms. In: Proc. of the 27th International Conference on Advanced Information Networking and Applications Workshops, pp. 1541–1546Google Scholar
  18. 18.
    Albin, E.: A Comparative Analysis of the Snort and Suricata intrusion-detection systems. Master Thesis (September 2011)Google Scholar
  19. 19.
    Herrero, A., Zurutuza, U., Corchado, E.: A neural-visualization ids for honeynet data. The International Journal of Neural Systems 22(2)Google Scholar
  20. 20.
    Herrero, A., Navarro, M., Corchado, E., Julian, V.: RT-MOVICAB-IDS: Addressing real-time intrusion detection. Future Generation Comp. Syst. 29(1), 250–261 (2013)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  1. 1.DIBRIS - University of GenovaGenovaItaly
  2. 2.DEI - University of PadovaPadovaItaly
  3. 3.E-Campus UniversityNovedrateItaly

Personalised recommendations