Theory and practice of bloom filters for distributed systems

S Tarkoma, CE Rothenberg… - … Surveys & Tutorials, 2011 - ieeexplore.ieee.org
Many network solutions and overlay networks utilize probabilistic techniques to reduce
information processing and networking costs. This survey article presents a number of …

Evasion techniques: Sneaking through your intrusion detection/prevention systems

TH Cheng, YD Lin, YC Lai… - … Communications Surveys & …, 2011 - ieeexplore.ieee.org
Detecting attacks disguised by evasion techniques is a challenge for signature-based
Intrusion Detection Systems (IDSs) and Intrusion Prevention Systems (IPSs). This study …

Adversarial attacks against intrusion detection systems: Taxonomy, solutions and open issues

I Corona, G Giacinto, F Roli - Information sciences, 2013 - Elsevier
Intrusion Detection Systems (IDSs) are one of the key components for securing computing
infrastructures. Their objective is to protect against attempts to violate defense mechanisms …

Bloom filter applications in network security: A state-of-the-art survey

S Geravand, M Ahmadi - Computer Networks, 2013 - Elsevier
Undoubtedly, dealing with security issues is one of the most important and complex tasks
various networks face today. A large number of security algorithms have been proposed to …

Design of a multiple bloom filter for distributed navigation routing

P Jiang, Y Ji, X Wang, J Zhu… - IEEE Transactions On …, 2013 - ieeexplore.ieee.org
Unmanned navigation of vehicles and mobile robots can be greatly simplified by providing
environmental intelligence with dispersed wireless sensors. The wireless sensors can work …

Evasion techniques efficiency over the ips/ids technology

H Kılıç, NS Katal, AA Selçuk - 2019 4th International …, 2019 - ieeexplore.ieee.org
Intrusion Prevention Systems (IPS) and Intrusion Detection Systems (IDS) are the first line of
the defense of cyber-environment. This technology is made for capturing and preventing …

Enhancing counting bloom filters through huffman-coded multilayer structures

D Ficara, A Di Pietro, S Giordano… - IEEE/ACM …, 2010 - ieeexplore.ieee.org
Bloom Filters are efficient randomized data structures for membership queries on a set with
a certain known false positive probability. Counting Bloom Filters (CBFs) allow the same …

Evaluating intrusion prevention systems with evasions

M Särelä, T Kyöstilä, T Kiravuo… - International Journal of …, 2017 - Wiley Online Library
Intrusion prevention systems have become a common security measure in the past 20 years.
Their promise is the possibility to prevent known attacks against vulnerable, unpatched …

A functional framework to evade network IDS

S Pastrana, A Orfila, A Ribagorda - 2011 44th Hawaii …, 2011 - ieeexplore.ieee.org
Signature based Network Intrusion Detection Systems (NIDS) apply a set of rules to identify
hostile traffic in network segments. Currently they are so effective detecting known attacks …

Methods and systems for full pattern matching in hardware

RS Stites, CD Botkin, BK Campbell - US Patent 8,458,796, 2013 - Google Patents
Methods and systems are provided for hardware-based pattern matching. In an
embodiment, an intrusion-prevention system (IPS) identifies a full match between a subject …