Method and apparatus for data packet pattern matching

GS Stellenberg, JJ Aviles - US Patent 7,134,143, 2006 - Google Patents
A pattern matching engine supports high speed (up to at least 2.4. Gbits per second line rate
speeds) parallel pattern matching operations in an unanchored fashion. The engine is …

Centralized scanner database with optimal definition distribution using network queries

P Szor - US Patent 8,214,977, 2012 - Google Patents
A system and method detects malware on client devices based on partially distributed
malware definitions from a central server. A server stores malware definitions for known …

High-performance context-free parser for polymorphic malware detection

YH Cho, WH Mangione-Smith - US Patent App. 11/918,592, 2009 - Google Patents
The invention provides a method and apparatus for advanced network intrusion detection.
The system uses deep packet inspection that can recognize languages described by context …

Scalable multigigabit pattern matching for packet inspection

I Sourdis, DN Pnevmatikatos… - IEEE Transactions on …, 2008 - ieeexplore.ieee.org
In this paper, we consider hardware-based scanning and analyzing packets payload in
order to detect hazardous contents. We present two pattern matching techniques to compare …

A pattern matching coprocessor for network security

YH Cho, WH Mangione-Smith - Proceedings of the 42nd annual Design …, 2005 - dl.acm.org
It has been estimated that computer network worms and virus caused the loss of over $55 B
in 2003. Network security system use techniques such as deep packet inspection to detect …

A reconfigurable perfect-hashing scheme for packet inspection

I Sourdis, D Pnevmatikatos, S Wong… - … Conference on Field …, 2005 - ieeexplore.ieee.org
In this paper, we consider scanning and analyzing packets in order to detect hazardous
contents using pattern matching. We introduce a hardware perfect-hashing technique to …

Fast reconfiguring deep packet filter for 1+ gigabit network

YH Cho, WH Mangione-Smith - 13th Annual IEEE Symposium …, 2005 - ieeexplore.ieee.org
Due to increasing number of network worms and virus, many computer network users are
vulnerable to attacks. Unless network security systems use more advanced methods of …

Hashing+ memory= low cost, exact pattern matching

G Papadopoulos… - … Conference on Field …, 2005 - ieeexplore.ieee.org
In this paper we propose the combination of hashing and use of memory to achieve low cost,
exact matching of SNORT-like intrusion signatures. The basic idea is to use hashing to …

Wind: Workload-aware intrusion detection

S Sinha, F Jahanian, JM Patel - … , September 20-22, 2006 Proceedings 9, 2006 - Springer
Intrusion detection and prevention systems have become essential to the protection of
critical networks across the Internet. Widely deployed IDS and IPS systems are based …

A system architecture for high-speed deep packet inspection in signature-based network intrusion prevention

S Kim, J Lee - Journal of Systems Architecture, 2007 - Elsevier
Pattern matching is one of critical parts of Network Intrusion Prevention Systems (NIPS).
Pattern matching hardware for NIPS should find a matching pattern at wire speed. However …