Search Results - "parallel string-matching algorithm"

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11

    Authors: Galil, Zvi

    Source: Journal of the Association for Computing Machinery. Jul95, Vol. 42 Issue 4, p908. 11p.

    Subject Terms: *Algorithms

  12. 12
  13. 13
  14. 14

    Source: 2012 1st International Conference on Recent Advances in Information Technology (RAIT); 1/ 1/2012, p478-481, 4p

  15. 15
  16. 16
  17. 17

    Source: Trustworthy Computing & Services; 2013, p349-356, 8p

  18. 18

    Authors: 陳建麟 黃能富

    Contributors: 陳建麟 黃能富

    Subject Terms: 字串比對

    Time: 2

    File Description: 155 bytes; text/html

    Relation: [1] M. Roesch, “Snort – lightweight intrusion detection for networks,” 13th Systems Administradion Conference, pages 229-238, Nov. 1999. [2] A. Baratloo, N. Singh, and T. Tsai, “Transparent run-time defense against stack smashing attacks,” USENIX Security Symposium, June 2000. [3] “Current Trends in IDS and IPS,”[On-line]. http://www.networksecurityjournal.com/features/current-trends-in-ids-ips-052907 . [4] “Snort - the de facto Standard for Intrusion Detection/Prevention,” [On-line]. Available: www.snort.org [5] S. Antonatos, K. G. Anagostakis, and E. P. Markatos, “Generating realistic work loads for network intrusion detection systems.” ACM Workshop on Software and Performance, Redwood Shores, CA., USA, 2004. [6] A. V. Aho and M. J. Corasick, “Efficient string matching: and aid to bibliographic search,” Communications of ACM, 18(6):333-340, 1975. [7] M. Fisk and G. Varghese, “Fast content-based packet handling for intrusion detection,” UCSD Tech. Rep. CS2001-0670, 2001. [8] K. G. Anagnostakis, E. P. Markatos, S. Antonatos, and M. Polychronakis, “E2XB: A domain-specific string matching algorithm for intrusion detection,” 18th IFIP Int. Information Security Conference, Athens, Greece, 2003. [9] R. T. Liu, N. F. Huang, C. H. Chen, and C. N. Kao, “A fast string-match algorithm for network processor-based net work intrusion detection system,” ACM Transactions on. Embedded Computer Systems, Vol.3, pp.614-633, 2004. [10] C. R. Clark and D. E. Schimmel, “Scalable pattern matching for high speed networks,” IEEE Symposium on Field-Programmable Custom Computing Machines (FCCM2004), Napa, CA, Apr.2004, pp. 249-257. [11] I. Sourdis and D. Pnevmatikatos. “Pre-decoded CAMs for efficient and high-speed NIDS pattern matching,” IEEE Symposium on Field-Programmable Custom Computing Machines (FCCM2005), 2005. [12] Y. Sugwara, M. Inaba, and K. Hiraki. “Over 10 Gbps string matching mechanism for multi-stream packet scanning systems,” International Conference on Field Programmable Logic and Application, Antwerp, Belgium, Aug. 2004. [13] S. Yusuf and W. Luk, “Bitwise optimised CAM for network intrusion detection systems,” International Conference on Field Programmable Logic and Application, 2005, pp.444-449. [14] F. Yu, R. H. Katz, and T. V. Lakshman, “Gigabit rate packet pattern-matching using TCAM,” IEEE International Conference on Network Protocols, 2004, pp. 174-183. [15] N. Tuck, T. Sherwood, B. Calder, and G. Varghese, “Deterministic memory-efficient string matching algorithms for intrusion detection,” IEEE INFOCOM 2004, pp. 2628-2639. [16] L. Tan and T. Sherwood, “A high throughput string matching architecture for intrusion detection and prevention,” International. Symposium on Computer Architecture, 2005, pp. 112-122. [17] Y. H. Cho and W. H. Mangione-Smith, “A pattern matching coprocessor for network security,” IEEE DAC2005, Anaheim, CA, 2005. [18] S. Dharmapurikar and J. Lookwod, “Fast and scalable pattern matching for content filtering,” Symposium of Architecture and Network. Communication. Systems, Princeton, NJ, 2005. [19] Lu H B, Zheng K, Liu B, Zhang X, and Liu Y H, “A Memory-Efficient Parallel String Matching Architecture for High Speed Intrusion Detection, IEEE JSAC, Vol.24, No. 10, Oct. 2006, pp. 1793-1804. [20] B. Bloom, “Space/time trade-offs in hash coding with allowable errors,” Communications of. ACM, Vol. 13, pp. 422-426, May 1970. [21] Analog Bits Inc.,”High speed Ternary CAM Datasheet,” 2004.[On-line]. Available: http://www.analogbits.com/pdf/High_Speed_T_CAM_Datasheet.pdf; http://nthur.lib.nthu.edu.tw/dspace/handle/987654321/30363

  19. 19
  20. 20