-
1
-
-
0016518897
-
Efficient string matching: An aid to bibliographic search
-
June
-
A. V. Aho and M. Corasick. Efficient string matching: An aid to bibliographic search. In Communications of the ACM, June 1975.
-
(1975)
Communications of the ACM
-
-
Aho, A.V.1
Corasick, M.2
-
3
-
-
34548322723
-
Memory-efficient regular expression search using state merging
-
M. Becchi and S. Cadambi. Memory-efficient regular expression search using state merging. In IEEE Infocom 2007.
-
IEEE Infocom 2007
-
-
Becchi, M.1
Cadambi, S.2
-
4
-
-
77954026099
-
An improved algorithm to accelerate regular expression evaluation
-
M. Becchi and P. Crowley. An improved algorithm to accelerate regular expression evaluation. In ANCS 2007.
-
ANCS 2007
-
-
Becchi, M.1
Crowley, P.2
-
5
-
-
65249160476
-
-
B. Brodie, R., and D. Taylor. A scalable architecture for high-throughput regular-expression pattern matching. SIGARCH Comput. Archit. News, 34(2):191-202, 2006.
-
B. Brodie, R., and D. Taylor. A scalable architecture for high-throughput regular-expression pattern matching. SIGARCH Comput. Archit. News, 34(2):191-202, 2006.
-
-
-
-
6
-
-
33751056900
-
Towards automatic generation of vulnerability-based signatures
-
May
-
D. Brumley, J. Newsome, D. Song, H. Wang, and S. Jha. Towards automatic generation of vulnerability-based signatures. In IEEE Symposium on Security and Privacy, May 2006.
-
(2006)
IEEE Symposium on Security and Privacy
-
-
Brumley, D.1
Newsome, J.2
Song, D.3
Wang, H.4
Jha, S.5
-
7
-
-
35248849034
-
Scalable pattern matching for high-speed networks
-
April
-
C. R. Clark and D. E. Schimmel. Scalable pattern matching for high-speed networks. In IEEE FCCM, April 2004.
-
(2004)
IEEE FCCM
-
-
Clark, C.R.1
Schimmel, D.E.2
-
9
-
-
85010849899
-
Denial of service via algorithmic complexity attacks
-
August
-
S. Crosby and D. Wallach. Denial of service via algorithmic complexity attacks. In Usenix Security, August 2003.
-
(2003)
Usenix Security
-
-
Crosby, S.1
Wallach, D.2
-
10
-
-
33749822913
-
Fast and scalable pattern matching for network intrusion detection systems
-
S. Dharmapurikar and J. W. Lockwood. Fast and scalable pattern matching for network intrusion detection systems. IEEE Journal on Selected Areas in Comm., 24(10):1781-1792, 2006.
-
(2006)
IEEE Journal on Selected Areas in Comm
, vol.24
, Issue.10
, pp. 1781-1792
-
-
Dharmapurikar, S.1
Lockwood, J.W.2
-
11
-
-
65249098881
-
-
The Guardian. Trouble on the line, http http://technology.guardian.co.uk/ weekly/story/0,1747343,00.html, 2006.
-
The Guardian. Trouble on the line, http http://technology.guardian.co.uk/ weekly/story/0,1747343,00.html, 2006.
-
-
-
-
12
-
-
85084160972
-
Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics
-
August
-
M. Handley, V. Paxson, and C. Kreibich. Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics. In Usenix Security, August 2001.
-
(2001)
Usenix Security
-
-
Handley, M.1
Paxson, V.2
Kreibich, C.3
-
15
-
-
0003620778
-
-
Addison Wesley
-
J. Hopcroft, R. Motwani, and J. Ullman. Introduction to Automata Theory, Languages, and Computation. Addison Wesley, 2006.
-
(2006)
Introduction to Automata Theory, Languages, and Computation
-
-
Hopcroft, J.1
Motwani, R.2
Ullman, J.3
-
16
-
-
65249133914
-
-
Myles Jordan. Dealing with metamorphism. Virus Bulletin Weekly, 2002.
-
Myles Jordan. Dealing with metamorphism. Virus Bulletin Weekly, 2002.
-
-
-
-
17
-
-
34547670827
-
Design of a web switch in a reconfigurable platform
-
C. Kachris and S. Vassiliadis. Design of a web switch in a reconfigurable platform. In ANCS 2006.
-
ANCS 2006
-
-
Kachris, C.1
Vassiliadis, S.2
-
19
-
-
77954013621
-
Curing regular expressions matching algorithms from insomnia, amnesia, and acalculia
-
S. Kumar, B. Chandrasekaran, J. Turner, and G. Varghese. Curing regular expressions matching algorithms from insomnia, amnesia, and acalculia. In ANCS 2007, pages 155-164.
-
ANCS 2007
, pp. 155-164
-
-
Kumar, S.1
Chandrasekaran, B.2
Turner, J.3
Varghese, G.4
-
20
-
-
34547700476
-
Algorithms to accelerate multiple regular expressions matching for deep packet inspection
-
September
-
S. Kumar, S. Dharmapurikar, F. Yu, P. Crowley, and J. Turner. Algorithms to accelerate multiple regular expressions matching for deep packet inspection. In ACM SIGCOMM, September 2006.
-
(2006)
ACM SIGCOMM
-
-
Kumar, S.1
Dharmapurikar, S.2
Yu, F.3
Crowley, P.4
Turner, J.5
-
21
-
-
34547683816
-
Advanced algorithms for fast and scalable deep packet inspection
-
S. Kumar, J. Turner, and J. Williams. Advanced algorithms for fast and scalable deep packet inspection. In ANCS 2006, pages 81-92.
-
ANCS 2006
, pp. 81-92
-
-
Kumar, S.1
Turner, J.2
Williams, J.3
-
22
-
-
79551630961
-
A fast string-matching algorithm for network processor-based intrusion detection system
-
614-633
-
R. Liu, N. Huang, C. Chen, and C. Kao. A fast string-matching algorithm for network processor-based intrusion detection system. Trans. on Embedded Computing Sys., 3(3):614-633, 2004.
-
(2004)
Trans. on Embedded Computing Sys
, vol.3
, Issue.3
-
-
Liu, R.1
Huang, N.2
Chen, C.3
Kao, C.4
-
23
-
-
61749104310
-
Niagara 2 opens the floodgates
-
November
-
H. McGhan. Niagara 2 opens the floodgates. In Microprocessor Report, November 2006.
-
(2006)
Microprocessor Report
-
-
McGhan, H.1
-
25
-
-
65249129703
-
Deep packet inspection: A service provider's solution for secure VoIP
-
Oct
-
M. Neider. Deep packet inspection: A service provider's solution for secure VoIP. VoIP Magazine, Oct 2005.
-
(2005)
VoIP Magazine
-
-
Neider, M.1
-
26
-
-
0033295259
-
Bro: A system for detecting network intruders in real-time
-
V. Paxson. Bro: a system for detecting network intruders in real-time. In Computer Networks, volume 31, pages 2435-2463, 1999.
-
(1999)
Computer Networks
, vol.31
, pp. 2435-2463
-
-
Paxson, V.1
-
27
-
-
37249008138
-
Insertion, evasion and denial of service: Eluding network intrusion detection
-
January
-
T. Ptacek and T. Newsham. Insertion, evasion and denial of service: Eluding network intrusion detection. In Secure Networks, Inc., January 1998.
-
(1998)
Secure Networks, Inc
-
-
Ptacek, T.1
Newsham, T.2
-
28
-
-
0003539116
-
Snort - lightweight intrusion detection for networks
-
USENIX
-
M. Roesch. Snort - lightweight intrusion detection for networks. In 13th Systems Administration Conference. USENIX, 1999.
-
(1999)
13th Systems Administration Conference
-
-
Roesch, M.1
-
29
-
-
84899126047
-
Active mapping: Resisting nids evasion without altering traffic
-
May
-
U. Shankar and Vern Paxson. Active mapping: Resisting nids evasion without altering traffic. In IEEE Symp. on Security and Privacy, May 2003.
-
(2003)
IEEE Symp. on Security and Privacy
-
-
Shankar, U.1
Paxson, V.2
-
30
-
-
39049092820
-
Backtracking algorithmic complexity attacks against a NIDS
-
R. Smith, C. Estan, and S. Jha. Backtracking algorithmic complexity attacks against a NIDS. In ACSAC 2006, pages 89-98.
-
ACSAC 2006
, pp. 89-98
-
-
Smith, R.1
Estan, C.2
Jha, S.3
-
32
-
-
14844324904
-
Enhancing byte-level network intrusion detection signatures with context
-
Oct
-
R. Sommer and V. Paxson. Enhancing byte-level network intrusion detection signatures with context. In ACM CCS, Oct. 2003.
-
(2003)
ACM CCS
-
-
Sommer, R.1
Paxson, V.2
-
34
-
-
27544490145
-
A high throughput string matching architecture for intrusion detection and prevention
-
June
-
L. Tan and T. Sherwood. A high throughput string matching architecture for intrusion detection and prevention. In ISCA, June 2005.
-
(2005)
ISCA
-
-
Tan, L.1
Sherwood, T.2
-
35
-
-
8344251916
-
Deterministic memory-efficient string matching algorithms for intrusion detection
-
N. Tuck, T. Sherwood, B. Calder, and G. Varghese. Deterministic memory-efficient string matching algorithms for intrusion detection. In IEEE INFOCOM 2004, pages 333-340.
-
(2004)
IEEE INFOCOM
, pp. 333-340
-
-
Tuck, N.1
Sherwood, T.2
Calder, B.3
Varghese, G.4
-
36
-
-
33750352075
-
Shield: Vulnerability-driven network filters for preventing known vulnerability exploits
-
August
-
H. J. Wang, C. Guo, D. Simon, and A. Zugenmaier. Shield: Vulnerability-driven network filters for preventing known vulnerability exploits. In ACM SIGCOMM, August 2004.
-
(2004)
ACM SIGCOMM
-
-
Wang, H.J.1
Guo, C.2
Simon, D.3
Zugenmaier, A.4
-
37
-
-
34547662263
-
Fast and memory-efficient regular expression matching for deep packet inspection
-
F. Yu, Z. Chen, Y. Diao, T. V. Lakshman, and R. H. Katz. Fast and memory-efficient regular expression matching for deep packet inspection. In ANCS 2006.
-
ANCS 2006
-
-
Yu, F.1
Chen, Z.2
Diao, Y.3
Lakshman, T.V.4
Katz, R.H.5
|