A fast and accurate hardware string matching module with Bloom filters

S Zengin, EG Schmidt - IEEE Transactions on Parallel and …, 2016 - ieeexplore.ieee.org
Many fields of computing such as Deep Packet Inspection (DPI) employ string matching
modules (SMM) that search for a given set of positive strings in their input. An SMM is …

Leveraging traffic repetitions for high-speed deep packet inspection

A Bremler-Barr, ST David, Y Harchol… - 2015 IEEE Conference …, 2015 - ieeexplore.ieee.org
Deep Packet Inspection (DPI) plays a major role in contemporary networks. Specifically, in
datacenters of content providers, the scanned data may be highly repetitive. Most DPI …

Plenoptic camera range finding

R Raynor, K Walli - 2013 IEEE Applied Imagery Pattern …, 2013 - ieeexplore.ieee.org
The ability of the plenoptic camera to perform ranging has been recognized since the
camera's inception. It is possible to think of the range finding operation performed by the …

xFilter: A temporal locality accelerator for intrusion detection system services

C Wang, J Zhou, L Gong, X Li… - … Conference on Web …, 2017 - ieeexplore.ieee.org
The Intrusion Detection Systems (IDS) is becoming important and quite timing/space
consuming due to the increasing volume of explosive data flood. During the past decades …

Fast approximate hash table using extended counting Bloom filter

J Zhou, C Wang, X Li, X Zhou - International Journal of …, 2015 - inderscienceonline.com
Naive hash table (NHT) scheme associates a set of keys to a set of values. Apart from hash
address computation, the search operation of the traditional scheme still brings three parts of …

[PDF][PDF] Integrating Aho-Corasick based algorithm for Compressed Traffic (ACCH) Inside Snort

A Gabai - 2015 - deepness-lab.org
Snort is a very popular network intrusion detection system (NIDS). One of its main methods
of inspection is to scan the traffic payload for malicious content. Unfortunately, Snort deals …

Architecture support for intrusion detection systems

G Sreekar Shenoy - 2012 - upcommons.upc.edu
System security is a prerequisite for efficient day-to-day transactions. As a consequence,
Intrusion Detection Systems (IDS) are commonly used to provide an effective security ring to …

Architecture support for intrusion detection systems

GS Shenoy - 2012 - dialnet.unirioja.es
System security is a prerequisite for efficient day-to-day transactions. As a consequence,
Intrusion Detection Systems (IDS) are commonly used to provide an effective security ring to …

[引用][C] A Software-Defined Framework for Improved Performance and Security of Network Functions

Y Harchol - 2016