메뉴 건너뛰기




Volumn , Issue , 2008, Pages 73-80

PERG: A scalable FPGA-based pattern-matching engine with consolidated Bloomier filters

Author keywords

[No Author keywords available]

Indexed keywords

BLOOMS (METAL); COMPUTER HARDWARE DESCRIPTION LANGUAGES; DISKS (STRUCTURAL COMPONENTS); FIELD PROGRAMMABLE GATE ARRAYS (FPGA); HARDWARE; INTERNET; INTRUSION DETECTION; VIRUSES;

EID: 63049133823     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/FPT.2008.4762368     Document Type: Conference Paper
Times cited : (25)

References (22)
  • 2
    • 33845898912 scopus 로고    scopus 로고
    • Characterizing antivirus workload execution
    • D. Uluski, M. Moffie, and D. Kaeli, "Characterizing antivirus workload execution," SIGARCH Comp., ACM, 2005, 33, 90-98.
    • (2005) SIGARCH Comp., ACM , vol.33 , pp. 90-98
    • Uluski, D.1    Moffie, M.2    Kaeli, D.3
  • 4
    • 63049085816 scopus 로고    scopus 로고
    • Snort. http://www.snort.org.
    • Snort
  • 7
    • 84963983866 scopus 로고    scopus 로고
    • Fast Regular Expression Matching Using FPGAs
    • R. Sidhu and V. Prasanna, "Fast Regular Expression Matching Using FPGAs," IEEE Symp. on FCCM, 2001, 227-238.
    • (2001) IEEE Symp. on FCCM , pp. 227-238
    • Sidhu, R.1    Prasanna, V.2
  • 8
    • 0016518897 scopus 로고
    • Efficient string matching: An aid to bibliographic search
    • A. V. Aho and M. J. Corasick, "Efficient string matching: an aid to bibliographic search," Comm. ACM, 1975, 18, 333-340.
    • (1975) Comm. ACM , vol.18 , pp. 333-340
    • Aho, A.V.1    Corasick, M.J.2
  • 9
    • 38549173266 scopus 로고    scopus 로고
    • High-performance pattern-matching for intrusion detection
    • J. van Lunteren, "High-performance pattern-matching for intrusion detection," IEEE Int'l. Conf. on Comp. Comm., 2006, 1-13.
    • (2006) IEEE Int'l. Conf. on Comp. Comm , pp. 1-13
    • van Lunteren, J.1
  • 10
    • 27544490145 scopus 로고    scopus 로고
    • A high throughput string matching architecture for intrusion detection and prevention
    • L. Tan and T. Sherwood, "A high throughput string matching architecture for intrusion detection and prevention," International Symposium on Computer Architecture, 2005, 112-122.
    • (2005) International Symposium on Computer Architecture , pp. 112-122
    • Tan, L.1    Sherwood, T.2
  • 11
    • 8344251916 scopus 로고    scopus 로고
    • Deterministic memory-efficient string matching algorithms for intrusion detection
    • 4
    • N. Tuck, T. Sherwood, B. Calder, and G. Varghese, "Deterministic memory-efficient string matching algorithms for intrusion detection," Proc. INFOCOM 2004, 2004, 4, 2628-2639 vol. 4.
    • (2004) Proc. INFOCOM , vol.2004 , Issue.4 , pp. 2628-2639
    • Tuck, N.1    Sherwood, T.2    Calder, B.3    Varghese, G.4
  • 12
    • 0014814325 scopus 로고
    • Space/time trade-offs in hash coding with allowable errors
    • B. H. Bloom, "Space/time trade-offs in hash coding with allowable errors," Comm. ACM, 1970, 13, 422-426.
    • (1970) Comm. ACM , vol.13 , pp. 422-426
    • Bloom, B.H.1
  • 15
    • 33746933463 scopus 로고    scopus 로고
    • A reconfigurable perfect-hashing scheme for packet inspection
    • I. Sourdis, D. Pnevmatikatos, S. Wong, and S. Vassiliadis, "A reconfigurable perfect-hashing scheme for packet inspection," FPL, 2005, 644-647.
    • (2005) FPL , pp. 644-647
    • Sourdis, I.1    Pnevmatikatos, D.2    Wong, S.3    Vassiliadis, S.4
  • 17
    • 50149092436 scopus 로고    scopus 로고
    • Applying cuckoo hashing for FPGA-based pattern matching in NIDS/NIPS
    • T. N. Thinh, S. Kittitornkun, and S. Tomiyama, "Applying cuckoo hashing for FPGA-based pattern matching in NIDS/NIPS," ICFPT 2007, 2007, 121-128.
    • (2007) ICFPT 2007 , pp. 121-128
    • Thinh, T.N.1    Kittitornkun, S.2    Tomiyama, S.3
  • 18
    • 50049108670 scopus 로고    scopus 로고
    • MRSI: A fast pattern matching algorithm for anti-virus applications
    • X. Zhou, B. Xu, Y. Qi, and J. Li, "MRSI: A fast pattern matching algorithm for anti-virus applications," Int'l. Conf. on Networking, 2008, 256-261.
    • (2008) Int'l. Conf. on Networking , pp. 256-261
    • Zhou, X.1    Xu, B.2    Qi, Y.3    Li, J.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.