메뉴 건너뛰기




Volumn , Issue , 2007, Pages

Design alternatives for a high-performance self-securing ethernet network interface

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER CRIME; ETHERNET; FIELD PROGRAMMABLE GATE ARRAYS (FPGA); HTTP; INTRUSION DETECTION; SERVERS; SOFTWARE DESIGN;

EID: 34548738932     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/IPDPS.2007.370290     Document Type: Conference Paper
Times cited : (12)

References (35)
  • 2
    • 0016518897 scopus 로고
    • Efficient String Matching: An Aid to Bibliographic Search
    • A. V. Aho and M. J. Corasick. Efficient String Matching: An Aid to Bibliographic Search. Commun. ACM, 18(6):333340, 1975.
    • (1975) Commun. ACM , vol.18 , Issue.6 , pp. 333340
    • Aho, A.V.1    Corasick, M.J.2
  • 3
    • 33644921425 scopus 로고    scopus 로고
    • Configurable string matching hardware for speeding up intrusion detection
    • M. Aldwairi, T. Conte, and P. Franzon. Configurable string matching hardware for speeding up intrusion detection. SIGARCH Comput. Archit. News, 33(1):99-107, 2005.
    • (2005) SIGARCH Comput. Archit. News , vol.33 , Issue.1 , pp. 99-107
    • Aldwairi, M.1    Conte, T.2    Franzon, P.3
  • 4
    • 34548793939 scopus 로고    scopus 로고
    • Alteon Networks. Tigon/PCI Ethernet Controller, Aug. 1997. Revision 1.04.
    • Alteon Networks. Tigon/PCI Ethernet Controller, Aug. 1997. Revision 1.04.
  • 8
    • 0017547820 scopus 로고
    • A Fast String Search Algorithm
    • Oct
    • R. S. Boyer and J. S. Moore. A Fast String Search Algorithm. Commun. ACM, 20(10):762-772, Oct. 1977.
    • (1977) Commun. ACM , vol.20 , Issue.10 , pp. 762-772
    • Boyer, R.S.1    Moore, J.S.2
  • 11
    • 20444487985 scopus 로고    scopus 로고
    • Finding and Containing Enemies Within the Walls with Selfsecuring Network Interfaces
    • Technical Report CMU-CS03-109, Carnegie Mellon School of Computer Science, Jan
    • G. R. Ganger, G. Economou, and S. M. Bielski. Finding and Containing Enemies Within the Walls with Selfsecuring Network Interfaces. Technical Report CMU-CS03-109, Carnegie Mellon School of Computer Science, Jan. 2003.
    • (2003)
    • Ganger, G.R.1    Economou, G.2    Bielski, S.M.3
  • 12
    • 33644961664 scopus 로고    scopus 로고
    • DARPA Intrusion Detection System Evaluation: Design and Procedures
    • Technical Report 1062, MIT Lincoln Laboratory
    • J. W. Haines, R. P. Lippmann, D. J. Fried, E. Tran, S. Boswell, and M. A. Zissman. 1999 DARPA Intrusion Detection System Evaluation: Design and Procedures. Technical Report 1062, MIT Lincoln Laboratory, 2001.
    • (1999)
    • Haines, J.W.1    Lippmann, R.P.2    Fried, D.J.3    Tran, E.4    Boswell, S.5    Zissman, M.A.6
  • 13
    • 84984028908 scopus 로고
    • Practical Fast Searching in Strings
    • R. N. Horspool. Practical Fast Searching in Strings. Software: Practice and Experience, 10(6):501-506, 1980.
    • (1980) Software: Practice and Experience , vol.10 , Issue.6 , pp. 501-506
    • Horspool, R.N.1
  • 14
    • 10744230067 scopus 로고    scopus 로고
    • A TCP Offload Accelerator for 10 Gb/s Ethernet in 90-nm CMOS
    • Nov
    • Y. Hoskote et al. A TCP Offload Accelerator for 10 Gb/s Ethernet in 90-nm CMOS. IEEE Journal of Solid-State Circuits, 38(11):1866-1875, Nov. 2003.
    • (2003) IEEE Journal of Solid-State Circuits , vol.38 , Issue.11 , pp. 1866-1875
    • Hoskote, Y.1
  • 15
    • 33645792351 scopus 로고    scopus 로고
    • G. S. Johnson, J. Lee, C. A. Burns, and W. R. Mark. The irregular z-buffer: Hardware acceleration for irregular data structures. ACM Transactions on Graphics, 24(4):14621482, 2005.
    • G. S. Johnson, J. Lee, C. A. Burns, and W. R. Mark. The irregular z-buffer: Hardware acceleration for irregular data structures. ACM Transactions on Graphics, 24(4):14621482, 2005.
  • 26
    • 34548738932 scopus 로고    scopus 로고
    • Design alternatives for a highperformance self-securing ethernet network interface
    • Technical Report TR-ECE-07-02, Purdue University, Jan
    • D. Schuff and V. S. Pai. Design alternatives for a highperformance self-securing ethernet network interface. Technical Report TR-ECE-07-02, Purdue University, Jan. 2007.
    • (2007)
    • Schuff, D.1    Pai, V.S.2
  • 30
    • 34548749129 scopus 로고    scopus 로고
    • Top Layer Networks. Network intrusion detection systems: Important IDS network security vulnerabilities. White Paper, September 2002.
    • Top Layer Networks. Network intrusion detection systems: Important IDS network security vulnerabilities. White Paper, September 2002.
  • 34
    • 0012405865 scopus 로고
    • A fast algorithm for multi-pattern searching
    • Technical Report TR-94-17, Department of Computer Science, University of Arizona
    • S. Wu and U. Manber. A fast algorithm for multi-pattern searching. Technical Report TR-94-17, Department of Computer Science, University of Arizona, 1994.
    • (1994)
    • Wu, S.1    Manber, U.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.