-
1
-
-
70450132481
-
-
Snort: http://www.snort.org/
-
-
-
-
2
-
-
27544471466
-
-
2nd (Syngress)
-
Alder, R., Babbin, J., Doxtater, A., Foster, J.C., Kohlenberg, T., and Rash, M.: ' Snort 2.1 intrusion detection ', 2nd (Syngress, 2004)
-
(2004)
Snort 2.1 Intrusion Detection
-
-
Alder, R.1
Babbin, J.2
Doxtater, A.3
Foster, J.C.4
Kohlenberg, T.5
Rash, M.6
-
4
-
-
70450138626
-
-
Introducing multi-threaded solution to enhance the efficiency of snort ', 2002, MS, Department of Computer Science, Florida State University
-
Abbas, S.: ' Introducing multi-threaded solution to enhance the efficiency of snort ', 2002, MS, Department of Computer Science, Florida State University
-
-
-
Abbas, S.1
-
5
-
-
3042626139
-
Evaluation of software techniques for parallel packet processing on multi-core processors
-
Las Vegas, NV, January
-
Vermeiren, T., Borghs, E., and Haaodorens, B.: ' Evaluation of software techniques for parallel packet processing on multi-core processors ', Proc. First IEEE Consumer Communications and Networking Conf., CCNC 2004, Las Vegas, NV, January, 2004, p. 645-647
-
(2004)
Proc. First IEEE Consumer Communications and Networking Conf., CCNC 2004
, pp. 645-647
-
-
Vermeiren, T.1
Borghs, E.2
Haaodorens, B.3
-
6
-
-
70450152223
-
Improving Snort performance with Barnyard
-
Turnbull, J.: ' Improving Snort performance with Barnyard ', EnterpriseLinux.Com Mag., 2007
-
(2007)
EnterpriseLinux.Com Mag.
-
-
Turnbull, J.1
-
7
-
-
23944475056
-
Improving the performance of signature-based network intrusion detection sensors by multi-threading
-
Haagdorens, B., Vermeiren, T., and Goossens, M.: ' Improving the performance of signature-based network intrusion detection sensors by multi-threading ', Proc. Int. Workshop on Information Security Applications, 2005, p. 188-203
-
(2005)
Proc. Int. Workshop on Information Security Applications
, pp. 188-203
-
-
Haagdorens, B.1
Vermeiren, T.2
Goossens, M.3
-
9
-
-
33644921425
-
Configurable string matching hardware for speeding up intrusion detection
-
()
-
Aldwairi, M., Conte, T., and Franzon, P.: ' Configurable string matching hardware for speeding up intrusion detection ', ACM SIGARCH Comput. Archit. News, 2005, 33, (1), p. 99-107
-
(2005)
ACM SIGARCH Comput. Archit. News
, vol.33
, Issue.1
, pp. 99-107
-
-
Aldwairi, M.1
Conte, T.2
Franzon, P.3
-
10
-
-
47649104471
-
One algorithm to match them all: On a generic NIPS pattern matching algorithm
-
Brooklyn Bridge, NY, May, 30
-
Weinsberg, Y., Tzur-David, S., Dolev, D., and Anker, T.L.: ' One algorithm to match them all: on a generic NIPS pattern matching algorithm ', Proc. 2007 Conf. High Performance Switching and Routing (HPSR'07), Brooklyn Bridge, NY, May, 30, 2007, p. 1-6
-
(2007)
Proc. 2007 Conf. High Performance Switching and Routing (HPSR'07)
, pp. 1-6
-
-
Weinsberg, Y.1
Tzur-David, S.2
Dolev, D.3
Anker, T.L.4
-
11
-
-
34748816267
-
Memory efficient string matching algorithm for network intrusion management system
-
()
-
Yu, J., Xue, Y., and Li, J.: ' Memory efficient string matching algorithm for network intrusion management system ', J. Tsinghua Sci. Technol., 2007, 12, (7), p. 585-593
-
(2007)
J. Tsinghua Sci. Technol.
, vol.12
, Issue.7
, pp. 585-593
-
-
Yu, J.1
Xue, Y.2
Li, J.3
-
12
-
-
35048884584
-
Performance evaluation of a probabilistic packet filter optimization algorithm for high-speed network monitoring
-
Toulouse, France, June
-
Coppens, J., De Smet, S., den Berghe, S., De Turck, F., and Demeester, P.: ' Performance evaluation of a probabilistic packet filter optimization algorithm for high-speed network monitoring ', Proc. Seventh IEEE Conf. High Speed Networks and Multimedia Communications, HSNMC 2004, Toulouse, France, June, 2004, p. 120-131
-
(2004)
Proc. Seventh IEEE Conf. High Speed Networks and Multimedia Communications, HSNMC 2004
, pp. 120-131
-
-
Coppens, J.1
De Smet, S.2
Den Berghe, S.3
De Turck, F.4
Demeester, P.5
-
13
-
-
34547667222
-
Packet pre-filtering for network intrusion detection
-
San Jose, CA, December
-
Sourdis, I., Dimopoulos, V., Pnevmatikatos, D., and Vassiliadis, S.: ' Packet pre-filtering for network intrusion detection ', Proc. ACM/IEEE Symposium on Architectures for Networking and Communications System, ANCS'06, San Jose, CA, December, 2006, p. 183-192
-
(2006)
Proc. ACM/IEEE Symposium on Architectures for Networking and Communications System, ANCS'06
, pp. 183-192
-
-
Sourdis, I.1
Dimopoulos, V.2
Pnevmatikatos, D.3
Vassiliadis, S.4
-
14
-
-
40549088573
-
Deep network packet filter design for reconfigurable devices
-
(), Article 21
-
Cho, Y., and Mangione-Smith, W.: ' Deep network packet filter design for reconfigurable devices ', ACM Trans. Embedded Comput. Syst., 2008, 7, (2), p. 26, Article 21
-
(2008)
ACM Trans. Embedded Comput. Syst.
, vol.7
, Issue.2
, pp. 26
-
-
Cho, Y.1
Mangione-Smith, W.2
-
15
-
-
50449094515
-
High-throughput linked-patter matching for intrusion detection systems
-
Princeton, NJ, October
-
Baker, Z., and Prasanna, K.: ' High-throughput linked-patter matching for intrusion detection systems ', Proc. ACM/IEEE Symp. Architectures for Networking and Communications System, ANCS'05, Princeton, NJ, October, 2005, p. 193-202
-
(2005)
Proc. ACM/IEEE Symp. Architectures for Networking and Communications System, ANCS'05
, pp. 193-202
-
-
Baker, Z.1
Prasanna, K.2
-
16
-
-
70349728018
-
Optimization of pattern matching algorithm for memory based architecture
-
Orlando, FL, December
-
Lin, C., Tai, Y., and Chang, S.: ' Optimization of pattern matching algorithm for memory based architecture ', Proc. ACM/IEEE Symp. Architectures for Networking and Communications System, ANCS'07, Orlando, FL, December, 2007, p. 11-16
-
(2007)
Proc. ACM/IEEE Symp. Architectures for Networking and Communications System, ANCS'07
, pp. 11-16
-
-
Lin, C.1
Tai, Y.2
Chang, S.3
-
17
-
-
77954020980
-
Compiling PCRE to FPGA for accelerating Snort IDS
-
Orlando, FL, December
-
Mitra, A., Najjar, W., and Bhuyan, L.: ' Compiling PCRE to FPGA for accelerating Snort IDS ', Proc. ACM/IEEE Symp. Architectures for Networking and Communications System, ANCS'07, Orlando, FL, December, 2007, p. 127-135
-
(2007)
Proc. ACM/IEEE Symp. Architectures for Networking and Communications System, ANCS'07
, pp. 127-135
-
-
Mitra, A.1
Najjar, W.2
Bhuyan, L.3
-
18
-
-
2642555499
-
Performance analysis of content matching intrusion detection systems
-
January
-
Antonatos, S., Anagnostakis, K.G., Markatos, E.P., and Polychronakis, M.: ' Performance analysis of content matching intrusion detection systems ', Proc. Int. Symp. Applications and the Internet (SAINT2004), January, 2004, p. 208
-
(2004)
Proc. Int. Symp. Applications and the Internet (SAINT2004)
, pp. 208
-
-
Antonatos, S.1
Anagnostakis, K.G.2
Markatos, E.P.3
Polychronakis, M.4
-
20
-
-
70349753940
-
-
The Snort Project March 12
-
The Snort Project: 'Snort users manual 2.81', March 12, 2008, available at http://www.snort.org/
-
(2008)
Snort users manual 2.81
-
-
-
21
-
-
70450131732
-
Efficient real-time Linux interface for PCI devices: A study on hardening a network intrusion detection system
-
Delft, The Netherlands, May, 15-19
-
Biswas, A., and Sinha, P.: ' Efficient real-time Linux interface for PCI devices: a study on hardening a network intrusion detection system ', Proc. Fifth System Administration and Network Engineering Conference, SANE 2006, Delft, The Netherlands, May, 15-19, 2006
-
(2006)
Proc. Fifth System Administration and Network Engineering Conference, SANE 2006
-
-
Biswas, A.1
Sinha, P.2
-
22
-
-
67649476439
-
Boosting throughput of Snort NIDS under Linux
-
December, 16-18
-
Salah, K., and Kahtani, A.: ' Boosting throughput of Snort NIDS under Linux ', Proc. Fifth IEEE Int. Conf. Innovations in Information Technology (Innovations'08), December, 16-18, 2008
-
(2008)
Proc. Fifth IEEE Int. Conf. Innovations in Information Technology (Innovations'08)
-
-
Salah, K.1
Kahtani, A.2
-
24
-
-
2442507142
-
Exclusion-based signature matching for intrusion detection
-
Markatos, E., Antonatos, S., Polychronakis, M., and Anagnostakis, K.: ' Exclusion-based signature matching for intrusion detection ', Proc. IASTED Int. Conf. Communications and Computer Networks, CCN, 2002
-
(2002)
Proc. IASTED Int. Conf. Communications and Computer Networks, CCN
-
-
Markatos, E.1
Antonatos, S.2
Polychronakis, M.3
Anagnostakis, K.4
-
25
-
-
0007526771
-
On the worst-case behavior of string-searching algorithms
-
0097-5397
-
Rivest, R.L.: ' On the worst-case behavior of string-searching algorithms ', SIAM J. Comput., 1977, 6, (4), p. 669-674 0097-5397
-
(1977)
SIAM J. Comput.
, vol.6
, Issue.4
, pp. 669-674
-
-
Rivest, R.L.1
-
28
-
-
33847037490
-
The performance analysis of Linux networking - Packet receiving
-
()
-
Wu, W., Crawford, M., and Bowden, M.: ' The performance analysis of Linux networking - packet receiving ', Int. J. Comput. Commun., 2007, 30, (5), p. 1044-1057
-
(2007)
Int. J. Comput. Commun.
, vol.30
, Issue.5
, pp. 1044-1057
-
-
Wu, W.1
Crawford, M.2
Bowden, M.3
-
29
-
-
0027541131
-
Performance consideration in designing network interfaces
-
0733-8716
-
Ramakrishnan, K.: ' Performance consideration in designing network interfaces ', IEEE J. Sel. Areas Commun., 1993, 11, (2), p. 203-219 0733-8716
-
(1993)
IEEE J. Sel. Areas Commun.
, vol.11
, Issue.2
, pp. 203-219
-
-
Ramakrishnan, K.1
-
31
-
-
0018011993
-
Approximate methods for analyzing queueing network models of computing systems
-
()
-
Chandy, K.M., and Sauer, C.H.: ' Approximate methods for analyzing queueing network models of computing systems ', J. ACM Comput. Surveys, 1978, 10, (3), p. 281-317
-
(1978)
J. ACM Comput. Surveys
, vol.10
, Issue.3
, pp. 281-317
-
-
Chandy, K.M.1
Sauer, C.H.2
-
32
-
-
35648972776
-
Performance analysis and comparison of interrupt-handling schemes in gigabit networks
-
()
-
Salah, K., El-Badawi, K., and Haidari, F.: ' Performance analysis and comparison of interrupt-handling schemes in gigabit networks ', J. Comput. Commun., 2007, 30, (17), p. 3225-3441
-
(2007)
J. Comput. Commun.
, vol.30
, Issue.17
, pp. 3225-3441
-
-
Salah, K.1
El-Badawi, K.2
Haidari, F.3
-
33
-
-
0029323403
-
Wide-AREA TRAffiC: The failure of Poisson modeling
-
1063-6692
-
Paxson, V., and Floyd, S.: ' Wide-AREA TRAffiC: the failure of Poisson modeling ', IEEE/ACM Trans. Netw., 1995, 3, (3), p. 226-244 1063-6692
-
(1995)
IEEE/ACM Trans. Netw.
, vol.3
, Issue.3
, pp. 226-244
-
-
Paxson, V.1
Floyd, S.2
-
34
-
-
0004210802
-
-
(Wiley Interscience, New York), Computer applications
-
Kleinrock, L.: ' Queueing systems ', (Wiley Interscience, New York, 1975), 2, Computer applications
-
(1975)
Queueing Systems
, vol.2
-
-
Kleinrock, L.1
-
36
-
-
70450154248
-
-
KUTE - a high performance kernel-based UDP traffic engine ', Technical Report 050118A, Center for Advanced Internet Architectures (CAIA)
-
' KUTE - a high performance kernel-based UDP traffic engine ', Technical Report 050118A, Center for Advanced Internet Architectures (CAIA)
-
-
-
-
38
-
-
48049106321
-
Pktgen the Linux packet generator
-
Ottawa, Canada
-
Olsson, R.: ' pktgen the Linux packet generator ', Proc. Linux Symp., Ottawa, Canada, 2005
-
(2005)
Proc. Linux Symp.
-
-
Olsson, R.1
|