Sciweavers

108 search results - page 15 / 22
» High-throughput linked-pattern matching for intrusion detect...
Sort
View
ICDE
2007
IEEE
206views Database» more  ICDE 2007»
14 years 8 months ago
Efficiently Processing Continuous k-NN Queries on Data Streams
Efficiently processing continuous k-nearest neighbor queries on data streams is important in many application domains, e. g. for network intrusion detection or in querysubscriber ...
Beng Chin Ooi, Christian Böhm, Claudia Plant,...
ICCCN
2007
IEEE
14 years 1 months ago
Bloom Filter Accelerator for String Matching
— In this paper we present a hardware architecture for string matching. Our solution based on using a Bloom filter based pre-processor and a parallelized hashing engine is capab...
M. Nourani, P. Katta
ANCS
2009
ACM
13 years 4 months ago
A NFA-based programmable regular expression match engine
Pattern matching is the most computation intensive task of a network intrusion detection system (NIDS). In this paper we present a hardware architecture to speed up the pattern mat...
Derek Pao
ACSAC
2006
IEEE
13 years 10 months ago
Offloading IDS Computation to the GPU
Signature-matching Intrusion Detection Systems can experience significant decreases in performance when the load on the IDS-host increases. We propose a solution that off-loads so...
Nigel Jacob, Carla E. Brodley
ISCC
2005
IEEE
107views Communications» more  ISCC 2005»
14 years 17 days ago
FTSE: The FNP-Like TCAM Searching Engine
As the Internet grows at a very rapid pace, so does the incidence of attack events and documented unlawful intrusions. The Network Intrusion Detection Systems (NIDSes) are designe...
Rong-Tai Liu, Chia-Nan Kao, Hung-Shen Wu, Ming-Cha...