An improved technology for content matching intrusion detection system

Y Wang, H Kobayashi - 2006 International Conference on …, 2006 - ieeexplore.ieee.org
Pattern matching is a comprehensive applicable key technology, which can be used in
network security applications such as intrusion detection systems (IDS), firewall, virus …

A gpu-based multiple-pattern matching algorithm for network intrusion detection systems

NF Huang, HW Hung, SH Lai, YM Chu… - … (aina workshops 2008 …, 2008 - ieeexplore.ieee.org
By the development of network applications, network security issues are getting more and
more important. This paper proposes a multiple-pattern matching algorithm for the network …

MDH: A high speed multi-phase dynamic hash string matching algorithm for large-scale pattern set

Z Zhou, Y Xue, J Liu, W Zhang, J Li - Information and Communications …, 2007 - Springer
String matching algorithm is one of the key technologies in numerous network security
applications and systems. Nowadays, the increasing network bandwidth and pattern set size …

An Algorithm of Large-Scale Approximate Multiple String Matching for Network Security

T Song, Y Xue, D Wang - 2006 First International Conference …, 2006 - ieeexplore.ieee.org
Payload checking has become the basic technique for network security applications, where
the exact string matching technology is widely used. But as the game between attackers and …

Performance improvement of signature-based traffic classification system by optimizing the search space

JS Park, SH Yoon, MS Kim - Journal of Internet Computing and …, 2011 - koreascience.kr
The payload signature-based traffic classification system has to deal with large amount of
traffic data, as the number of internet-based applications and network traffic continue to …

Direct pattern matching on compressed text

ES De Moura, G Navarro, N Ziviani… - … String Processing and …, 1998 - ieeexplore.ieee.org
We present a fast compression and decompression technique for natural language texts.
The novelty is that the exact search can be done on the compressed text directly, using any …

Highly compressed multi-pattern string matching on the cell broadband engine

X Zha, DP Scarpazza, S Sahni - 2011 IEEE Symposium on …, 2011 - ieeexplore.ieee.org
With its 9 cores per chip, the IBM Cell/Broadband Engine (Cell) can deliver an impressive
amount of compute power and benefit the string-matching kernels of network security …

[HTML][HTML] Detecting very large sets of referenced files at 40/100 GbE, especially MP4 files

A Larbanet, J Lerebours, JP David - Digital Investigation, 2015 - Elsevier
Internet traffic monitoring is an increasingly challenging task because of the high
bandwidths, especially at Internet Service Provider routers and/or Internet backbones. We …

In-depth packet inspection using a hierarchical pattern matching algorithm

TF Sheu, NF Huang, HP Lee - IEEE Transactions on …, 2008 - ieeexplore.ieee.org
Detection engines capable of inspecting packet payloads for application-layer network
information are urgently required. The most important technology for fast payload inspection …

A novel hierarchical matching algorithm for intrusion detection systems

TF Sheu, NF Huang, HP Lee - GLOBECOM'05. IEEE Global …, 2005 - ieeexplore.ieee.org
As more and more network security threats are emerging today, the network-based intrusion
detection system (NIDS) is one of the most important systems to protect the network from …