A survey on regular expression matching for deep packet inspection: Applications, algorithms, and hardware platforms

C Xu, S Chen, J Su, SM Yiu… - … Surveys & Tutorials, 2016 - ieeexplore.ieee.org
Deep packet inspection (DPI) is widely used in content-aware network applications such as
network intrusion detection systems, traffic billing, load balancing, and government …

OCPAD: One class Naive Bayes classifier for payload based anomaly detection

M Swarnkar, N Hubballi - Expert Systems with Applications, 2016 - Elsevier
Application specific attack detection requires packet payload analysis. Current payload
analysis techniques suffer from failed detection as they use only the presence or absence of …

SEAL: SDN based secure and agile framework for protecting smart city applications from DDoS attacks

NZ Bawany, JA Shamsi - Journal of Network and Computer Applications, 2019 - Elsevier
Evolution of smart cities induces critical challenges related to cyber and network security.
The increased reliance of a smart city on Information and Communication Technologies …

Development of reinforcement learning and pattern matching (RLPM) based firewall for secured cloud infrastructure

JJ Praise, RJS Raj, JVB Benifa - Wireless Personal Communications, 2020 - Springer
Cloud computing infrastructure is typically intended to store and deliver sensitive data and
high performance computing resources through the internet. As the utility of cloud computing …

Encrypted network behaviors identification based on dynamic time warping and k-nearest neighbor

Z Hejun, Z Liehuang - Cluster Computing, 2019 - Springer
In order to solve the problem of encrypted traffic identification, the identification method
based on dynamic time warping (DTW) and k-nearest neighbor (KNN) for the encrypted …

Instagram user behavior identification based on multidimensional features

H Wu, Q Wu, G Cheng, S Guo - IEEE INFOCOM 2020-IEEE …, 2020 - ieeexplore.ieee.org
The development of smartphones and social networks has brought great convenience to our
lives. Due to the increasing requirements of user privacy, user data are protected by …

SFIM: Identify user behavior based on stable features

H Wu, Q Wu, G Cheng, S Guo, X Hu, S Yan - Peer-to-Peer Networking and …, 2021 - Springer
The development of smartphones and social networks has brought great convenience to our
lives. Due to the increasing requirements of user privacy, user data are protected by …

A novel JSON based regular expression language for pattern matching in the internet of things

RU Rasool, M Najam, HF Ahmad, H Wang… - Journal of Ambient …, 2019 - Springer
Abstract The Internet of Things work by constantly sensing the physical properties in the
vicinity of the user such as ambient light, sounds, motion and temperature. These sensors …

PTME: A Regular Expression Matching Engine Based on Speculation and Enumerative Computation on FPGA

M Sun, G Xie, F Zhang, W Guo, X Fan, T Li… - ACM Transactions on …, 2024 - dl.acm.org
Fast regular expression matching is an essential task for deep packet inspection. In previous
works, the regular expression matching engine on FPGA struggled to achieve an ideal …

Hierarchical contaminated web page classification based on meta tag denoising disposal

X Song, Y Zhu, X Zeng, X Chen - Security and Communication …, 2021 - Wiley Online Library
Web page classification is critical for information retrieval. Most web page classification
methods have the following two faults:(1) need to analyze based on the overall web page …