Sciweavers

108 search results - page 16 / 22
» High-throughput linked-pattern matching for intrusion detect...
Sort
View
DAC
2007
ACM
14 years 8 months ago
Compact State Machines for High Performance Pattern Matching
Pattern matching is essential to a wide range of applications such as network intrusion detection, virus scanning, etc. Pattern matching algorithms normally rely on state machines...
Piti Piyachon, Yan Luo
ACSAC
2006
IEEE
14 years 1 months ago
Backtracking Algorithmic Complexity Attacks against a NIDS
Network Intrusion Detection Systems (NIDS) have become crucial to securing modern networks. To be effective, a NIDS must be able to counter evasion attempts and operate at or near...
Randy Smith, Cristian Estan, Somesh Jha
MEMOCODE
2010
IEEE
13 years 4 months ago
A regular expression matching using non-deterministic finite automaton
Abstract--This paper shows an implementation of CANSCID (Combined Architecture for Stream Categorization and Intrusion Detection). To satisfy the required system throughput, the pa...
Hiroshi Nakahara, Tsutomu Sasao, Munehiro Matsuura
ICARIS
2007
Springer
13 years 10 months ago
Defence Against 802.11 DoS Attacks Using Artificial Immune System
In this paper we present an Artificial Immune System (AIS) based security framework, which prevents a number of serious Denial of Service (DoS) attacks. The proposed security frame...
M. Zubair Shafiq, Muddassar Farooq
FCCM
2004
IEEE
163views VLSI» more  FCCM 2004»
13 years 10 months ago
Implementation Results of Bloom Filters for String Matching
Network Intrusion Detection and Prevention Systems (IDPS) use string matching to scan Internet packets for malicious content. Bloom filters offer a mechanism to search for a large...
Michael Attig, Sarang Dharmapurikar, John W. Lockw...