A survey on FPGA support for the feasible execution of virtualized network functions

GS Niemiec, LMS Batista… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
Network Functions Virtualization (NFV) has received considerable attention in the past few
years, both from industry and academia, due to its potential for reducing capital and …

A systematic review of scalable hardware architectures for pattern matching in network security

M Imran, F Bashir, AR Jafri, M Rashid… - Computers & Electrical …, 2021 - Elsevier
Pattern matching algorithms and techniques are extensively deployed in a network intrusion
detection system. A plethora of scalable pattern matching hardware architectures exist with …

Exploration of hardware architectures for string matching algorithms in network intrusion detection systems

M Rashid, M Imran, AR Jafri - … of the 11th international conference on …, 2020 - dl.acm.org
An intrusion detection system monitors and analyzes all the incoming packets, on a given
network, to detect any corresponding vulnerabilities and intrusions. It consists of four major …

Comparative performance analysis the Aho-Corasick algorithm for developing a network detection system

K Tashev, I Durdona… - … Conference on Information …, 2022 - ieeexplore.ieee.org
Nowadays the Internet is very massive and the need for a system to protect the networks
from being attacked becomes very important. One of the main goals of studying pattern …

[引用][C] Application of the Aho-Corasick algorithm to create a network intrusion detection system

K Tashev, M Agzamova, N Axmedova - Bulletin of TUIT: Management and …, 2021

[PDF][PDF] アプリケーションルータにおける情報抽出およびテーブル検索のアクセラレーションに関する研究(本文)

八巻隼人 - (No Title), 2016 - core.ac.uk
The rapid progress of Internet technologies in recent years makes increase of demand for
high functionality services, such as IDS (Intrusion Detection System). To meet the demand …