P Szor - US Patent 8,214,977, 2012 - Google Patents
A system and method detects malware on client devices based on partially distributed malware definitions from a central server. A server stores malware definitions for known …
YH Cho, WH Mangione-Smith - US Patent App. 11/918,592, 2009 - Google Patents
The invention provides a method and apparatus for advanced network intrusion detection. The system uses deep packet inspection that can recognize languages described by context …
In this paper, we consider hardware-based scanning and analyzing packets payload in order to detect hazardous contents. We present two pattern matching techniques to compare …
YH Cho, WH Mangione-Smith - Proceedings of the 42nd annual Design …, 2005 - dl.acm.org
It has been estimated that computer network worms and virus caused the loss of over $55 B in 2003. Network security system use techniques such as deep packet inspection to detect …
In this paper, we consider scanning and analyzing packets in order to detect hazardous contents using pattern matching. We introduce a hardware perfect-hashing technique to …
Due to increasing number of network worms and virus, many computer network users are vulnerable to attacks. Unless network security systems use more advanced methods of …
G Papadopoulos… - … Conference on Field …, 2005 - ieeexplore.ieee.org
In this paper we propose the combination of hashing and use of memory to achieve low cost, exact matching of SNORT-like intrusion signatures. The basic idea is to use hashing to …
S Sinha, F Jahanian, JM Patel - … , September 20-22, 2006 Proceedings 9, 2006 - Springer
Intrusion detection and prevention systems have become essential to the protection of critical networks across the Internet. Widely deployed IDS and IPS systems are based …
S Kim, J Lee - Journal of Systems Architecture, 2007 - Elsevier
Pattern matching is one of critical parts of Network Intrusion Prevention Systems (NIPS). Pattern matching hardware for NIPS should find a matching pattern at wire speed. However …