作者
Young H Cho, William H Mangione-Smith
发表日期
2008/1/29
期刊
ACM Transactions on Embedded Computing Systems (TECS)
卷号
7
期号
2
页码范围
1-26
出版商
ACM
简介
Most network routers and switches provide some protection against the network attacks. However, the rapidly increasing amount of damages reported over the past few years indicates the urgent need for tougher security. Deep-packet inspection is one of the solutions to capture packets that can not be identified using the traditional methods. It uses a list of signatures to scan the entire content of the packet, providing the means to filter harmful packets out of the network. Since one signature does not depend on the other, the filtering process has a high degree of parallelism. Most software and hardware deep-packet filters that are in use today execute the tasks under Von Neuman architecture. Such architecture can not fully take advantage of the parallelism. For instance, one of the most widely used network intrusion-detection systems, Snort, configured with 845 patterns, running on a dual 1-GHz Pentium III system …
引用总数
200820092010201120122013201420152016201720182019202020212022202320241715658332222112
学术搜索中的文章
YH Cho, WH Mangione-Smith - ACM Transactions on Embedded Computing Systems …, 2008