-
1
-
-
85090433665
-
-
th System Administration Conference and Exhibition (LISA'1999). Berkeley, CA, USA: USENIX Assoc., 1999: 229-238.
-
-
-
-
3
-
-
3543088606
-
Generating realistic workloads for network intrusion detection systems
-
Antonatos S., Anagnostakis K., and Markatos E. Generating realistic workloads for network intrusion detection systems. Software Engineering Notes 29 1 (2004) 207-215
-
(2004)
Software Engineering Notes
, vol.29
, Issue.1
, pp. 207-215
-
-
Antonatos, S.1
Anagnostakis, K.2
Markatos, E.3
-
4
-
-
0016518897
-
Fast pattern matching: An aid to bibliographic search
-
Aho A., and Corasick M. Fast pattern matching: An aid to bibliographic search. Communications of the ACM 18 6 (1975) 333-340
-
(1975)
Communications of the ACM
, vol.18
, Issue.6
, pp. 333-340
-
-
Aho, A.1
Corasick, M.2
-
6
-
-
84964497101
-
-
Coit C J, Staniford S, McAlerney J. Towards faster string matching for intrusion detection or exceeding the speed of Snort. In: Proceedings of the DARPA Information Survivability Conference and Exposition II (DISCEX'01). Los Alamitos, CA, USA: IEEE Comput. Soc., 2001, 1: 367-373.
-
-
-
-
8
-
-
84904280510
-
-
th IFIP International Information Security Conference (SEC2003). Athens, Greece: Kluwer Acadamic Pubhishers, 2003: 217-228.
-
-
-
-
9
-
-
1542375781
-
-
Huang J, Tian J, Du R, Zhai J. Research of pattern matching in intrusion detection. In: Proceedings of the 2003 International Conference on Machine Learning and Cybernetics. Piscataway, NJ, USA: IEEE, 2003, 3: 1877-1882.
-
-
-
-
10
-
-
79551630961
-
A fast string-matching algorithm for network processor-based intrusion detection system
-
Liu R., Huang N., Chen C., and Kao C. A fast string-matching algorithm for network processor-based intrusion detection system. ACM Transactions on Embedded Computing Systems 3 3 (2004) 614-633
-
(2004)
ACM Transactions on Embedded Computing Systems
, vol.3
, Issue.3
, pp. 614-633
-
-
Liu, R.1
Huang, N.2
Chen, C.3
Kao, C.4
-
11
-
-
19944424800
-
Real-time intrusion detection for high speed networks
-
Jiang W., Song H., and Dai Y. Real-time intrusion detection for high speed networks. Computers and Security 24 4 (2005) 287-294
-
(2005)
Computers and Security
, vol.24
, Issue.4
, pp. 287-294
-
-
Jiang, W.1
Song, H.2
Dai, Y.3
-
12
-
-
62349096286
-
A parallel NIDS pattern matching engine and its implementation on network processor
-
CSREA Press, Las Vegas, USA
-
Yu J., and Li J. A parallel NIDS pattern matching engine and its implementation on network processor. Proceedings of the 2005 International Conference on Security and Management (2005), CSREA Press, Las Vegas, USA 375-381
-
(2005)
Proceedings of the 2005 International Conference on Security and Management
, pp. 375-381
-
-
Yu, J.1
Li, J.2
-
15
-
-
33746158996
-
A framework for rule processing in reconfigurable network systems
-
IEEE, Napa, CA, USA
-
th Annual IEEE Symposium on Field-Programmable Custom Computing Machines (2005), IEEE, Napa, CA, USA 225-234
-
(2005)
th Annual IEEE Symposium on Field-Programmable Custom Computing Machines
, pp. 225-234
-
-
Attig, M.1
Lockwood, J.2
-
16
-
-
33746154556
-
A signature match processor architecture for network intrusion detection
-
IEEE, Napa, CA, USA
-
th Annual IEEE Symposium on Field-Programmable Custom Computing Machine (2005), IEEE, Napa, CA, USA 235-242
-
(2005)
th Annual IEEE Symposium on Field-Programmable Custom Computing Machine
, pp. 235-242
-
-
Janardhan, S.1
Bu, L.2
Chandy, J.3
-
18
-
-
84944030124
-
Deep packet inspection using parallel Bloom filters
-
IEEE, Stanford, CA, USA
-
th Symposium on High Performance Interconnects (2003), IEEE, Stanford, CA, USA 44-51
-
(2003)
th Symposium on High Performance Interconnects
, pp. 44-51
-
-
Dharmapurikar, S.1
Krishnamurthy, P.2
Sproull, T.3
Lockwood, J.4
-
19
-
-
2442457808
-
Time and area efficient pattern matching on FPGAs
-
ACM, Monterey, CA, USA
-
th ACM International Symposium on Field-Programmable Gate Arrays (2004), ACM, Monterey, CA, USA 223-232
-
(2004)
th ACM International Symposium on Field-Programmable Gate Arrays
, pp. 223-232
-
-
Baker, Z.1
Prasanna, V.2
-
20
-
-
8344251916
-
Deterministic memory-efficient string matching algorithms for intrusion detection
-
IEEE, Piscataway, NJ, USA
-
Tuck N., Sherwood T., Calder B., and Varghese G. Deterministic memory-efficient string matching algorithms for intrusion detection. Proceedings of IEEE INFOCOM 2004 4 (2004), IEEE, Piscataway, NJ, USA 2628-2639
-
(2004)
Proceedings of IEEE INFOCOM 2004
, vol.4
, pp. 2628-2639
-
-
Tuck, N.1
Sherwood, T.2
Calder, B.3
Varghese, G.4
-
21
-
-
0017547820
-
A fast string searching algorithm
-
Boyer R., and Moore J. A fast string searching algorithm. Communications of the ACM 20 10 (1977) 762-772
-
(1977)
Communications of the ACM
, vol.20
, Issue.10
, pp. 762-772
-
-
Boyer, R.1
Moore, J.2
-
22
-
-
84984028908
-
Practical fast searching in strings
-
Horspool R. Practical fast searching in strings. Software Practice and Experience 10 6 (1980) 501-506
-
(1980)
Software Practice and Experience
, vol.10
, Issue.6
, pp. 501-506
-
-
Horspool, R.1
-
25
-
-
20444493210
-
-
Cowan C, Arnold S, Beattie S, Wright C, Viega J DEFCON capture the flag: Defending vulnerable code form intense attack. In: Proceedings of the DARPA DISCEX III Conference. Washington D C, USA, 2003.
-
-
-
|