[图书][B] The state of the art in intrusion prevention and detection

ASK Pathan - 2014 - api.taylorfrancis.com
Most of the security threats in various communications networks are posed by the illegitimate
entities that enter or intrude within the network perimeter, which could commonly be termed …

Compiling pcre to fpga for accelerating snort ids

A Mitra, W Najjar, L Bhuyan - Proceedings of the 3rd ACM/IEEE …, 2007 - dl.acm.org
Deep Payload Inspection systems like SNORT and BRO utilize regular expression for their
rules due to their high expressibility and compactness. The SNORT IDS system uses the …

On the influence of test-driven development on software design

DS Janzen, H Saiedian - 19th Conference on Software …, 2006 - ieeexplore.ieee.org
Test-driven development (TDD) is an agile software development strategy that addresses
both design and testing. This paper describes a controlled experiment that examines the …

High-performance and compact architecture for regular expression matching on FPGA

YH Yang, V Prasanna - IEEE Transactions on Computers, 2011 - ieeexplore.ieee.org
We present the design, implementation and evaluation of a high-performance architecture
for regular expression matching (REM) on field-programmable gate array (FPGA). Each …

GPU acceleration of regular expression matching for large datasets: exploring the implementation space

X Yu, M Becchi - Proceedings of the ACM International Conference on …, 2013 - dl.acm.org
Regular expression matching is a central task in several networking (and search)
applications and has been accelerated on a variety of parallel architectures, including …

Designing a programmable wire-speed regular-expression matching accelerator

J Van Lunteren, C Hagleitner, T Heil… - 2012 45th Annual …, 2012 - ieeexplore.ieee.org
A growing number of applications rely on fast pattern matching to scan data in real-time for
security and analytics purposes. The RegX accelerator in the IBM Power Edge of Network …

Network intrusion detection using hardware techniques: A review

R Abdulhammed, M Faezipour… - 2016 IEEE Long Island …, 2016 - ieeexplore.ieee.org
The increasing amount of network throughput and security threat makes intrusion detection
a major research problem. In the literature, intrusion detection has been approached by …

Toward adjoinable MPI

J Utke, L Hascoet, P Heimbach, C Hill… - … on Parallel & …, 2009 - ieeexplore.ieee.org
Automatic differentiation is the primary means of obtaining analytic derivatives from a
numerical model given as a computer program. Therefore, it is an essential productivity tool …

Automatic generation of regular expressions from examples with genetic programming

A Bartoli, G Davanzo, A De Lorenzo, M Mauri… - Proceedings of the 14th …, 2012 - dl.acm.org
We explore the practical feasibility of a system based on genetic programming (GP) for the
automatic generation of regular expressions. The user describes the desired task by …

Software-hardware codesign for efficient in-memory regular pattern matching

L Kong, Q Yu, A Chattopadhyay, A Le Glaunec… - Proceedings of the 43rd …, 2022 - dl.acm.org
Regular pattern matching is used in numerous application domains, including text
processing, bioinformatics, and network security. Patterns are typically expressed with an …