메뉴 건너뛰기




Volumn 5758 LNCS, Issue , 2009, Pages 265-283

Regular expression matching on graphics hardware for intrusion detection

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTATIONAL POWER; CPU CYCLES; DATA PARALLELISM; EXPRESSIVE POWER; FLEXIBLE PATTERNS; GRAPHICS HARDWARE; GRAPHICS PROCESSING UNITS; IN-NETWORK; INTRUSION DETECTION SYSTEMS; MULTIPLE INPUTS; PACKET PROCESSING; REGULAR EXPRESSIONS; REGULAR-EXPRESSION MATCHING; SPAM FILTERING; VIRUS SCANNERS;

EID: 76649131237     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-04342-0_14     Document Type: Conference Paper
Times cited : (72)

References (31)
  • 2
    • 85019691440 scopus 로고    scopus 로고
    • Testing intrusion detection systems: A critique of the 1998 and 1999 darpa intrusion detection system evaluations as performed by lincoln laboratory
    • Testing intrusion detection systems: a critique of the 1998 and 1999 darpa intrusion detection system evaluations as performed by lincoln laboratory. ACM Trans. Inf. Syst. Secur. 3(4), 262-294 (2000)
    • (2000) ACM Trans. Inf. Syst. Secur , vol.3 , Issue.4 , pp. 262-294
  • 3
    • 0016518897 scopus 로고
    • Efficient string matching: An aid to bibliographic search
    • Aho, A.V., Corasick, M.J.: Efficient string matching: an aid to bibliographic search. Communications of the ACM 18(6), 333-340 (1975)
    • (1975) Communications of the ACM , vol.18 , Issue.6 , pp. 333-340
    • Aho, A.V.1    Corasick, M.J.2
  • 6
    • 0022989344 scopus 로고
    • From regular expressions to deterministic automata
    • Berry, G., Sethi, R.: From regular expressions to deterministic automata. Theor. Comput. Sci. 48(1), 117-126 (1986)
    • (1986) Theor. Comput. Sci , vol.48 , Issue.1 , pp. 117-126
    • Berry, G.1    Sethi, R.2
  • 8
    • 24144454572 scopus 로고    scopus 로고
    • Cook, D.L., Ioannidis, J., Keromytis, A.D., Luck, J.: Cryptographics: Secret key cryptography using graphics cards. In: Menezes, A. (ed.) CT-RSA 2005. LNCS, 3376, pp. 334-350. Springer, Heidelberg (2005)
    • Cook, D.L., Ioannidis, J., Keromytis, A.D., Luck, J.: Cryptographics: Secret key cryptography using graphics cards. In: Menezes, A. (ed.) CT-RSA 2005. LNCS, vol. 3376, pp. 334-350. Springer, Heidelberg (2005)
  • 9
    • 0020159687 scopus 로고
    • The compilation of regular expressions into integrated circuits
    • Floyd, R.W., Ullman, J.D.: The compilation of regular expressions into integrated circuits. J. ACM 29(3), 603-622 (1982)
    • (1982) J. ACM , vol.29 , Issue.3 , pp. 603-622
    • Floyd, R.W.1    Ullman, J.D.2
  • 10
    • 70350637734 scopus 로고    scopus 로고
    • Signature matching in network processing using SIMD/GPU architectures
    • Technical Report TR1628
    • Goyal, N., Ormont, J., Smith, R., Sankaralingam, K., Estan, C.: Signature matching in network processing using SIMD/GPU architectures. Technical Report TR1628 (2008)
    • (2008)
    • Goyal, N.1    Ormont, J.2    Smith, R.3    Sankaralingam, K.4    Estan, C.5
  • 11
    • 68949216895 scopus 로고    scopus 로고
    • Practical symmetric key cryptography on modern graphics hardware
    • Berkeley, CA, USA, July, USENIX Association
    • Harrison, O., Waldron, J.: Practical symmetric key cryptography on modern graphics hardware. In: Proceedings of the 17th USENIX Security Symposium, Berkeley, CA, USA, July 2008, pp. 195-209. USENIX Association (2008)
    • (2008) Proceedings of the 17th USENIX Security Symposium , pp. 195-209
    • Harrison, O.1    Waldron, J.2
  • 17
    • 34447528956 scopus 로고    scopus 로고
    • Massive threading: Using GPUs to increase the performance of digital forensics tools
    • Richard III, G.G., Marziale, L., Roussev, V.: Massive threading: Using GPUs to increase the performance of digital forensics tools. Digital Investigation 1, 73-81 (2007)
    • (2007) Digital Investigation , vol.1 , pp. 73-81
    • Richard III, G.G.1    Marziale, L.2    Roussev, V.3
  • 18
    • 33645793950 scopus 로고    scopus 로고
    • Moscola, J., Lockwood, J., Loui, R.P., Pachos, M.: Implementation of a content-scanning module for an internet firewall. In: FCCM, pp. 31-38 (2003)
    • Moscola, J., Lockwood, J., Loui, R.P., Pachos, M.: Implementation of a content-scanning module for an internet firewall. In: FCCM, pp. 31-38 (2003)
  • 20
    • 85084164413 scopus 로고    scopus 로고
    • Bro: A system for detecting network intruders in real-time
    • Berkeley, CA, USA, p, USENIX Association
    • Paxson, V.: Bro: A system for detecting network intruders in real-time. In: Proceedings of the 7th conference on USENIX Security Symposium (SSYM 1998), Berkeley, CA, USA, p. 3. USENIX Association (1998)
    • (1998) Proceedings of the 7th conference on USENIX Security Symposium (SSYM , pp. 3
    • Paxson, V.1
  • 21
    • 85090433665 scopus 로고    scopus 로고
    • Roesch, M.: Snort: Lightweight intrusion detection for networks. In: Proceedings of the 1999 USENIX LISA Systems Administration Conference (November 1999)
    • Roesch, M.: Snort: Lightweight intrusion detection for networks. In: Proceedings of the 1999 USENIX LISA Systems Administration Conference (November 1999)
  • 26
    • 50249130270 scopus 로고    scopus 로고
    • Xfa: Faster signature matching with extended automata
    • IEEE Computer Society, Los Alamitos
    • Smith, R., Estan, C., Jha, S.: Xfa: Faster signature matching with extended automata. In: IEEE Symposium on Security and Privacy, pp. 187-201. IEEE Computer Society, Los Alamitos (2008)
    • (2008) IEEE Symposium on Security and Privacy , pp. 187-201
    • Smith, R.1    Estan, C.2    Jha, S.3
  • 29
    • 84945708555 scopus 로고
    • Programming techniques: Regular expression search algorithm
    • Thompson, K.: Programming techniques: Regular expression search algorithm. Commun. ACM 11(6), 419-422 (1968)
    • (1968) Commun. ACM , vol.11 , Issue.6 , pp. 419-422
    • Thompson, K.1
  • 30
    • 56549099368 scopus 로고    scopus 로고
    • Vasiliadis, G., Antonatos, S., Polychronakis, M., Markatos, E.P., Ioannidis, S.: Gnort: High performance network intrusion detection using graphics processors. In: Lippmann, R., Kirda, E., Trachtenberg, A. (eds.) RAID 2008. LNCS, 5230, pp. 116-134. Springer, Heidelberg (2008)
    • Vasiliadis, G., Antonatos, S., Polychronakis, M., Markatos, E.P., Ioannidis, S.: Gnort: High performance network intrusion detection using graphics processors. In: Lippmann, R., Kirda, E., Trachtenberg, A. (eds.) RAID 2008. LNCS, vol. 5230, pp. 116-134. Springer, Heidelberg (2008)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.