Intrusion detection system: A comprehensive review

HJ Liao, CHR Lin, YC Lin, KY Tung - Journal of Network and Computer …, 2013 - Elsevier
With the increasing amount of network throughput and security threat, the study of intrusion
detection systems (IDSs) has received a lot of attention throughout the computer science …

CloudEyes: Cloud‐based malware detection with reversible sketch for resource‐constrained internet of things (IoT) devices

H Sun, X Wang, R Buyya, J Su - Software: Practice and …, 2017 - Wiley Online Library
Because of the rapid increasing of malware attacks on the Internet of Things in recent years,
it is critical for resource‐constrained devices to guard against potential risks. The traditional …

CETAnalytics: Comprehensive effective traffic information analytics for encrypted traffic classification

C Dong, C Zhang, Z Lu, B Liu, B Jiang - Computer Networks, 2020 - Elsevier
Encrypted traffic classification is of great significance for advanced network services. Though
encryption methods seem unbroken in protecting users' privacy, existing studies have …

Accelerating pattern matching using a novel parallel algorithm on GPUs

CH Lin, CH Liu, LS Chien… - IEEE Transactions on …, 2012 - ieeexplore.ieee.org
Graphics processing units (GPUs) have attracted a lot of attention due to their cost-effective
and enormous power for massive data parallel computing. In this paper, we propose a novel …

Who watches the watchmen: A security-focused review on current state-of-the-art techniques, tools, and methods for systems and binary analysis on modern platforms

M Botacin, PLD Geus, A Grégio - ACM Computing Surveys (CSUR), 2018 - dl.acm.org
Malicious software, a threat users face on a daily basis, have evolved from simple bankers
based on social engineering to advanced persistent threats. Recent research and …

Otter: A scalable high-resolution encrypted traffic identification engine

E Papadogiannaki, C Halevidis, P Akritidis… - Research in Attacks …, 2018 - Springer
Several security applications rely on monitoring network traffic, which is increasingly
becoming encrypted. In this work, we propose a pattern language to describe packet trains …

Trustav: Practical and privacy preserving malware analysis in the cloud

D Deyannis, E Papadogiannaki… - Proceedings of the …, 2020 - dl.acm.org
While the number of connected devices is constantly growing, we observe an increased
incident rate of cyber attacks that target user data. Typically, personal devices contain the …

Parallelization and characterization of pattern matching using GPUs

G Vasiliadis, M Polychronakis… - 2011 IEEE International …, 2011 - ieeexplore.ieee.org
Pattern matching is a highly computationally intensive operation used in a plethora of
applications. Unfortunately, due to the ever increasing storage capacity and link speeds, the …

A high-throughput DPI engine on GPU via algorithm/implementation co-optimization

CL Hsieh, L Vespa, N Weng - Journal of Parallel and Distributed …, 2016 - Elsevier
Abstract The Graphics Processing Unit (GPU) is a promising platform to implement Deep
Packet Inspection (DPI) due to the GPU's rich parallelism and programmability for high …

A highly-efficient memory-compression approach for GPU-accelerated virus signature matching

C Pungila, V Negru - … Security: 15th International Conference, ISC 2012 …, 2012 - Springer
We are proposing an approach for implementing highly compressed Aho-Corasick and
Commentz-Walter automatons for performing GPU-accelerated virus scanning, suitable for …