A survey on encrypted network traffic analysis applications, techniques, and countermeasures

E Papadogiannaki, S Ioannidis - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
The adoption of network traffic encryption is continually growing. Popular applications use
encryption protocols to secure communications and protect the privacy of users. In addition …

Optimization techniques for GPU programming

P Hijma, S Heldens, A Sclocco… - ACM Computing …, 2023 - dl.acm.org
In the past decade, Graphics Processing Units have played an important role in the field of
high-performance computing and they still advance new fields such as IoT, autonomous …

Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model

S Aljawarneh, M Aldwairi, MB Yassein - Journal of Computational Science, 2018 - Elsevier
Efficiently detecting network intrusions requires the gathering of sensitive information. This
means that one has to collect large amounts of network transactions including high details of …

Intrusion detection system: A comprehensive review

HJ Liao, CHR Lin, YC Lin, KY Tung - Journal of Network and Computer …, 2013 - Elsevier
With the increasing amount of network throughput and security threat, the study of intrusion
detection systems (IDSs) has received a lot of attention throughout the computer science …

PacketShader: a GPU-accelerated software router

S Han, K Jang, KS Park, S Moon - ACM SIGCOMM Computer …, 2010 - dl.acm.org
We present PacketShader, a high-performance software router framework for general packet
processing with Graphics Processing Unit (GPU) acceleration. PacketShader exploits the …

Accelerated deep neural networks for enhanced intrusion detection system

S Potluri, C Diedrich - 2016 IEEE 21st international conference …, 2016 - ieeexplore.ieee.org
Network based communication is more vulnerable to outsider and insider attacks in recent
days due to its wide spread applications in many fields. Intrusion Detection System (IDS) a …

A survey on regular expression matching for deep packet inspection: Applications, algorithms, and hardware platforms

C Xu, S Chen, J Su, SM Yiu… - … Surveys & Tutorials, 2016 - ieeexplore.ieee.org
Deep packet inspection (DPI) is widely used in content-aware network applications such as
network intrusion detection systems, traffic billing, load balancing, and government …

Kargus: a highly-scalable software-based intrusion detection system

MA Jamshed, J Lee, S Moon, I Yun, D Kim… - Proceedings of the …, 2012 - dl.acm.org
As high-speed networks are becoming commonplace, it is increasingly challenging to
prevent the attack attempts at the edge of the Internet. While many high-performance …

[图书][B] The state of the art in intrusion prevention and detection

ASK Pathan - 2014 - api.taylorfrancis.com
Most of the security threats in various communications networks are posed by the illegitimate
entities that enter or intrude within the network perimeter, which could commonly be termed …

MIDeA: a multi-parallel intrusion detection architecture

G Vasiliadis, M Polychronakis, S Ioannidis - Proceedings of the 18th …, 2011 - dl.acm.org
Network intrusion detection systems are faced with the challenge of identifying diverse
attacks, in extremely high speed networks. For this reason, they must operate at multi …