메뉴 건너뛰기




Volumn 5, Issue , 2006, Pages 2118-2123

AntiWorm NPU-based parallel bloom filters in Giga-Ethernet LAN

Author keywords

Computer networks; IXP network processor; Network processors; Network security; Parallel bloom filters; Worm blaster; Worms

Indexed keywords

COMPUTER WORMS; IDENTIFICATION (CONTROL SYSTEMS); NETWORK SECURITY; PROGRAM PROCESSORS;

EID: 42549117244     PISSN: 05361486     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICC.2006.255083     Document Type: Conference Paper
Times cited : (5)

References (31)
  • 1
    • 0014814325 scopus 로고
    • Space/Time Trade-Offs in Hash Coding with Allowable Errors
    • May
    • B. Bloom, "Space/Time Trade-Offs in Hash Coding with Allowable Errors," Comm. ACM, vol. 13, no. 7, May 1970, pp. 422-426.
    • (1970) Comm. ACM , vol.13 , Issue.7 , pp. 422-426
    • Bloom, B.1
  • 4
    • 42549116673 scopus 로고    scopus 로고
    • Special issues on Network Processors, Intel Technology Journal, 06, Issue 03, August 15, 2002.
    • Special issues on Network Processors, Intel Technology Journal, Volume 06, Issue 03, August 15, 2002.
  • 7
    • 3242768505 scopus 로고    scopus 로고
    • Issues in High-Speed Internet Security
    • July
    • Peder Jungck and Simon S.Y. Shim, "Issues in High-Speed Internet Security," IEEE computer magazine, Vol. 37, No. 7, pp. 36-42, July 2004.
    • (2004) IEEE computer magazine , vol.37 , Issue.7 , pp. 36-42
    • Jungck, P.1    Shim, S.S.Y.2
  • 8
    • 42549092227 scopus 로고    scopus 로고
    • First Proceedings of the 2003 ACM workshop on Rapid Malcode (WORM'2003), October 2003.
    • First Proceedings of the 2003 ACM workshop on Rapid Malcode (WORM'2003), October 2003.
  • 9
    • 42549108184 scopus 로고    scopus 로고
    • Second Proceedings of the 2004 ACM workshop on Rapid Malcode (WORM'2004), October 29, 2004, Washington, DC, USA.
    • Second Proceedings of the 2004 ACM workshop on Rapid Malcode (WORM'2004), October 29, 2004, Washington, DC, USA.
  • 10
    • 3042742908 scopus 로고    scopus 로고
    • An analysis of the Slapper worm
    • Pages:, Jan.-Feb
    • I. Arce and E. Levy, "An analysis of the Slapper worm," IEEE Security & Privacy, Vol. 1 No. 1, Pages: 82-87, Jan.-Feb. 2003.
    • (2003) IEEE Security & Privacy , vol.1 , Issue.1 , pp. 82-87
    • Arce, I.1    Levy, E.2
  • 12
    • 3042683635 scopus 로고    scopus 로고
    • Worm and attack early warning: Piercing stealthy reconnaissance
    • Pages:, May-June
    • S. J. Stolfo, "Worm and attack early warning: piercing stealthy reconnaissance," IEEE Security & Privacy, Volume: 02, Issue: 3, Pages: 73-75, May-June 2004.
    • (2004) IEEE Security & Privacy , vol.2 , Issue.3 , pp. 73-75
    • Stolfo, S.J.1
  • 13
    • 4344593013 scopus 로고    scopus 로고
    • Beyond stack smashing: Recent advances in exploiting buffer overruns
    • pages, July-Aug
    • J. Pincus and R. Baker, "Beyond stack smashing: recent advances in exploiting buffer overruns," IEEE Security & Privacy Magazine, Volume 2, Issue: 4, page(s): 20-27: July-Aug. 2004.
    • (2004) IEEE Security & Privacy Magazine , vol.2 , Issue.4 , pp. 20-27
    • Pincus, J.1    Baker, R.2
  • 14
    • 4344627335 scopus 로고    scopus 로고
    • The spread of the Witty worm
    • pages, July-Aug
    • C. Shannon and D. Moore, "The spread of the Witty worm," IEEE Security & Privacy Magazine, Volume 2, Issue: 4, page(s): 46-50, July-Aug. 2004.
    • (2004) IEEE Security & Privacy Magazine , vol.2 , Issue.4 , pp. 46-50
    • Shannon, C.1    Moore, D.2
  • 15
    • 4344608055 scopus 로고    scopus 로고
    • E. Levy, Approaching zero [attack trends], IEEE Security & Privacy Magazine, 2, Issue: 4, page(s): 65-66, July-Aug. 2004.
    • E. Levy, Approaching zero [attack trends], IEEE Security & Privacy Magazine, Volume 2, Issue: 4, page(s): 65-66, July-Aug. 2004.
  • 19
    • 0141762461 scopus 로고    scopus 로고
    • Code-Red: A case study on the spread and victims of an internet worm
    • Marseille France, November
    • D. Moore, C. Shannon, and J. Brown. "Code-Red: a case study on the spread and victims of an internet worm," Proceedings of the Internet Measurement Workshop 2002, Marseille France, November 2002.
    • (2002) Proceedings of the Internet Measurement Workshop
    • Moore, D.1    Shannon, C.2    Brown, J.3
  • 20
    • 1842478680 scopus 로고    scopus 로고
    • Deep packet inspection using parallel bloom filters
    • Pages:, Jan.-Feb
    • Sarang Dharmapurikar, Praveen Krishnamurthy, T.S. Sproull and J. W. Lockwood, "Deep packet inspection using parallel bloom filters," IEEE Micro, Volume 24, Issue 1, Pages:52-61, Jan.-Feb. 2004.
    • (2004) IEEE Micro , vol.24 , Issue.1 , pp. 52-61
    • Dharmapurikar, S.1    Krishnamurthy, P.2    Sproull, T.S.3    Lockwood, J.W.4
  • 21
    • 1842583287 scopus 로고    scopus 로고
    • Architecture for a hardware-based, TCP/IP content-processing system
    • Pages:, Jan.-Feb
    • D. V. Schuehler, J. Moscola and J. W. Lockwood, "Architecture for a hardware-based, TCP/IP content-processing system," IEEE Micro, Volume 24, Issue 1, Pages: 62-69, Jan.-Feb. 2004.
    • (2004) IEEE Micro , vol.24 , Issue.1 , pp. 62-69
    • Schuehler, D.V.1    Moscola, J.2    Lockwood, J.W.3
  • 22
    • 8844226734 scopus 로고    scopus 로고
    • Zhangxi Tan, Chuang Lin, Hao Yin, Bo Li, Optimization and Benchmark of Cryptographic Algorithms on Network Processors, IEEE Micro., 24, Issue 5,Sep-Oct issues, 2004.
    • Zhangxi Tan, Chuang Lin, Hao Yin, Bo Li, "Optimization and Benchmark of Cryptographic Algorithms on Network Processors", IEEE Micro., Volume 24, Issue 5,Sep-Oct issues, 2004.
  • 23
    • 42549131873 scopus 로고    scopus 로고
    • Signature of worm, see
    • Signature of worm, see http://www.clamav.net
  • 24
    • 42549157565 scopus 로고    scopus 로고
    • Symantec Inc, see
    • Symantec Inc., see http://www.symantec.com/
  • 25
    • 42549094996 scopus 로고    scopus 로고
    • Silicon Defense, see
    • Silicon Defense, see http://www.silicondefense.com
  • 26
    • 42549130929 scopus 로고    scopus 로고
    • Snort, see
    • Snort, see http://www.snort.org/
  • 27
    • 42549144038 scopus 로고    scopus 로고
    • Sourcefire, see
    • Sourcefire, see http://www.sourcefire.com/
  • 29
    • 42549092052 scopus 로고    scopus 로고
    • Radisys Corporations, ENP-2611 technique documents, 2004.
    • Radisys Corporations, ENP-2611 technique documents, 2004.
  • 31
    • 0035275672 scopus 로고    scopus 로고
    • ClassPI:an architecture for fast and flexible packet classification
    • Mar/Apr
    • S. Iyer, R. Rao Kompella, and A. Shelat, "ClassPI:an architecture for fast and flexible packet classification," IEEE Networks, Volume: 15, Issue: 2, Mar/Apr 2001.
    • (2001) IEEE Networks , vol.15 , Issue.2
    • Iyer, S.1    Rao Kompella, R.2    Shelat, A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.