Skip to main content

Memristors and the Future of Cyber Security Hardware

  • Chapter
  • First Online:
Network Science and Cybersecurity

Part of the book series: Advances in Information Security ((ADIS,volume 55))

  • 3451 Accesses

Abstract

The chapter covers three approaches to emulate a memristor-based computer using artificial neural networks, and we describe how a memristor computer could be used to solve Cyber security problems. The memristor emulation neural network approach was divided into three basic deployment methods: (1) deployment of neural networks on the traditional Von Neumann CPU architecture (2) software based algorithms deployed on the Von Neumann architecture utilizing a Graphics Processing Units (GPUs), and (3) a hardware architecture deployed onto a field-programmable gate array.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. A. Mitra, W. Najjar, L. Bhuyan, Compiling PCRE to FPGA for accelerating SNORT IDS, in ACM/IEEE Symposium on Architectures for Networking and Communications Systems, Orlando, FL, Dec 2007

    Google Scholar 

  2. Lower Columbia College, Synapse of interconnecting neurons (2013), http://lowercolumbia.edu/students/academics/facultyPages/rhode-cary/intro-neural-net.htm (Fig. 1 image in chapter) pp. 1223–1230. Accessed 21 Mar 2013

  3. Wikipedia, Neuron (2013), http://en.wikipedia.org/wiki/Neuron. Accessed 10 Mar 2013

  4. Wikipedia, Neural Network (2013), http://en.wikipedia.org/wiki/Neural_network. Accessed 10 Mar 2013

  5. Wikipedia, Feed forward neural network (2013), http://en.wikipedia.org/wiki/Feedforward_neural_network. Accessed 10 Mar 2013

  6. S.L. Pinjare, Implementation of neural network back propagation training algorithm on FPGA, Int. J. Comput. Appl. 52(6), 0975–8887 (2012)

    Google Scholar 

  7. H. Jiang, The application of genetic neural network in network intrusion detection. J. Comput. 4(12), 1223–1230 (2009)

    Google Scholar 

  8. B. Conan, K. Guy, A neural network on GPU (2008), http://www.codeproject.com/Articles/24361/A-Neural-Network-on-GPU. Accessed 13 Mar 2008

  9. Wikipedia, Neural network software (2013), http://en.wikipedia.org/wiki/Neural_network_software. Accessed 10 Mar 2013

  10. J. Hofmann, Evolving neural networks on GPUs, GECCO (2011), http://www.gpgpgpu.com/gecco2011/entries/03/gecco.pdf. Accessed 21 May 2013

  11. Wikipedia, Graphics processing unit (2013), http://en.wikipedia.org/wiki/Graphics_processing_unit. Accessed 13 Mar 2013

  12. Wikipedia, FPGA (2013), http://en.wikipedia.org/wiki/Field-programmable_gate_array. Accessed 10 Mar 2013

  13. P. Lysaght, J. Stockwood, J. Law, D. Girma, Artificial neural network implementation on a fine-grained FPGA, in Field Programmable Logic and Applications ed. by Hartenstein, Servít (Springer-Verlag, New York, 1994) pp. 421–431

    Google Scholar 

  14. A. Muthuramalingam, S. Himavathi, E. Srinivasan, Neural network implementation using FPGA: issues and application. Int. J. Inf. Commun. Eng. 4, 6 (2008)

    Google Scholar 

  15. Q.A. Tran, Evolving block-based neural network and field programmable gate arrays for host-based intrusion detection system, in 2012 Fourth International Conference on Knowledge and Systems Engineering (2012)

    Google Scholar 

  16. A.A. Hassan, A. Elnakib, M. Abo-Elsoud, FPGA-based neuro-architecture intrusion detection system, in International Conference on Computer Engineering & Systems, Cairo, Egypt, 25–27 Nov 2008, pp. 268–273

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Michael J. Shevenell .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer Science+Business Media New York

About this chapter

Cite this chapter

Shevenell, M.J., Shumaker, J.L., Edwards, A.H., Pino, R.E. (2014). Memristors and the Future of Cyber Security Hardware. In: Pino, R. (eds) Network Science and Cybersecurity. Advances in Information Security, vol 55. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-7597-2_17

Download citation

  • DOI: https://doi.org/10.1007/978-1-4614-7597-2_17

  • Published:

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4614-7596-5

  • Online ISBN: 978-1-4614-7597-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics