Figures and Tables from this paper
- figure 1
- figure 2
- table 2
- figure 3
- figure 4
Topics
Multi-string Matching (opens in a new tab)Graphics Computing Unit (opens in a new tab)Snort (opens in a new tab)Network Intrusion Detection Systems (opens in a new tab)Network Attacks (opens in a new tab)Data Parallelism (opens in a new tab)Aho-Corasick Algorithm (opens in a new tab)Perfect Hashing (opens in a new tab)State Machines (opens in a new tab)
10 Citations
- V. SanzAdrián PousaM. NaioufA. D. Giusti
- 2019
Computer Science
ICA3PP
This paper presents a novel hybrid pattern matching algorithm that efficiently exploits the computing power of a heterogeneous system composed of multicore processors and multiple graphics processing units (GPUs).
- 4
- V. SanzAdrián PousaM. NaioufA. D. Giusti
- 2020
Computer Science
ICA3PP
A pattern matching algorithm that exploits the full computational power of Intel Xeon Phi processors by using both SIMD and thread parallelism and reveals that both parallelism methods provide performance gains.
- Taejune ParkJaehyun NamS. NaJaewoong ChungSeungwon Shin
- 2021
Computer Science, Engineering
ACSAC
Reinhardt represents regex patterns as a combination of reconfigurable cells in hardware and updates regex patterns in real-time while providing high performance, and can operate as NIDS/NIPS and as the REM accelerator for them.
- 4
- Junaid Shabbir AbbasiF. BashirK. QureshiM. Najam-ul-IslamGwanggil Jeon
- 2021
Computer Science, Engineering
Comput. Electr. Eng.
- 17
- Carl NykvistMartin Larsson
- 2019
Computer Science, Engineering
It is concluded that due to computational complexity and slow hardware processing capabilities of Wi-Fi Pineapple, it could not become suitable IDS in the presence of different pattern matching strategies and a modification of Snort is proposed to increase the throughput of the system.
- PDF
- Dylan ChouMeng Jiang
- 2020
Computer Science, Engineering
ArXiv
A carefully designed taxonomy highlighting eight main challenges and solutions is presented and common datasets from 1999 to 2020 are explored and future directions are proposed on expanding NID into cloud-based environments, devising scalable models for larger amount of network intrusion data, and creating labeled datasets collected in real-world networks.
- 11
- Highly Influenced[PDF]
- H. S. KumarNitesh KumarM. Devi
- 2019
Computer Science, Engineering
The review paper aims to give a brief idea of what's a network and its related security issues especially about passive attacks and how to detect and prevent them, by using the existing methods and tools available.
- 1
- PDF
- Laurens D’hoogeMiel VerkerkenT. WautersB. VolckaertF. de Turck
- 2021
Computer Science, Engineering
Comput. Networks
- 5
- M. Domb
- 2020
Computer Science, Engineering
Advances in Intelligent Systems and Computing
- M. Domb
- 2020
Computer Science, Engineering
- 1
8 References
- Cheng-Hung LinChen-Hsiung LiuLungsheng ChienShih-Chieh Chang
- 2013
Computer Science
IEEE Transactions on Computers
Several techniques are introduced to do optimization on GPUs, including reducing global memory transactions of input buffer, reducing latency of transition table lookup, eliminating output table accesses, avoiding bank-conflict of shared memory, coalescing writes to global memory, and enhancing data transmission via peripheral component interconnect express.
- 97
- Cheng-Hung LinJin-Cheng LiChen-Hsiung LiuShih-Chieh Chang
- 2017
Computer Science
IEEE Transactions on Parallel and Distributed…
Two parallel string matching algorithms which adopt perfect hashing to compact a state transition table are proposed which reduce up to 99.5 percent memory requirements for storing the state Transition table compared to the traditional two-dimensional memory architecture.
- 20
- Giorgos VasiliadisS. AntonatosM. PolychronakisE. MarkatosS. Ioannidis
- 2008
Computer Science, Engineering
RAID
An intrusion detection system based on the Snort open-source NIDS that exploits the underutilized computational power of modern graphics cards to offload the costly pattern matching operations from the CPU, and thus increase the overall processing throughput.
- 363
- PDF
- Xinming ChenYiyao WuLianghong XuY. Xue
- 2009
Computer Science, Engineering
A modular design of parallel NIDS based on Snort, named Para-Snort, that enables flexible and easy module design and the performance impact of load balancing and multi-pattern matching is analyzed.
- 22
- Highly Influential
- PDF
- Z. BakerV. Prasanna
- 2004
Computer Science, Engineering
12th Annual IEEE Symposium on Field-Programmable…
This work presents a methodology for system-wide integration of graph-based partitioning of large intrusion detection pattern databases that yields designs with competitive clock frequencies that are a minimum of 8x more area efficient than previous non-predecoded shift-and-compare architectures.
- 128
- PDF
- Cheng-Hung LinChen-Hsiung LiuShih-Chieh ChangW. Hon
- 2012
Computer Science
2012 Proceedings IEEE INFOCOM
A novel memory architecture using perfect hashing to condense state transition tables without hash collisions is proposed, which achieves up to 99.5% improvement in memory reduction compared to the traditional two-dimensional memory architecture.
- 17
- A. MitraW. NajjarL. Bhuyan
- 2007
Computer Science, Engineering
ANCS '07
This paper details the implementation of hardware based regular expression engines for the SNORT IDS by transforming the PCRE opcodes generated by the PCre compiler from SNORT regular expression rules, and implements a regular expression only once for each new rule in theSNORT ruleset, thus resulting in a fast system that scales well with new updates.
- 178
- PDF
- A. AhoM. J. Corasick
- 1975
Computer Science
Commun. ACM
A simple, efficient algorithm to locate all occurrences of any of a finite number of keywords in a string of text that has been used to improve the speed of a library bibliographic search program by a factor of 5 to 10.
- 2,160
- PDF
Related Papers
Showing 1 through 3 of 0 Related Papers