[PDF][PDF] An overview of flow-based and packet-based intrusion detection performance in high speed networks

H Alaidaros, M Mahmuddin, A Al Mazari - Proceedings of the …, 2011 - academia.edu
Network Intrusion Detection Systems (NIDSs) are widely-deployed security tools for
detecting cyber-attacks and activities conducted by intruders for observing network traffics …

Fast detection of transformed data leaks

X Shu, J Zhang, DD Yao, W Feng - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
The leak of sensitive data on computer systems poses a serious threat to organizational
security. Statistics show that the lack of proper encryption on files and communications due …

Data-driven network intrusion detection: A taxonomy of challenges and methods

D Chou, M Jiang - arXiv preprint arXiv:2009.07352, 2020 - arxiv.org
Data-driven methods have been widely used in network intrusion detection (NID) systems.
However, there are currently a number of challenges derived from how the datasets are …

[PDF][PDF] Performance of opendpi in identifying sampled network traffic

J Khalife, A Hajjar, J Díaz-Verdejo - Journal of Networks, 2013 - Citeseer
The identification of the nature of the traffic flowing through a TCP/IP network is a relevant
target for traffic engineering and security related tasks. Despite the privacy concerns it …

Speculative parallel pattern matching using stride-k DFA for deep packet inspection

M Najam, U Younis, R ur Rasool - Journal of Network and Computer …, 2015 - Elsevier
Modern deep packet inspection (DPI) systems match network traffic against a large set of
patterns which are defined using regular expressions. Deterministic finite automata (DFA) is …

[HTML][HTML] PCA and PSO based optimized support vector machine for efficient intrusion detection in internet of things

MP Raghunath, S Deshmukh, P Chaudhari… - Measurement …, 2025 - Elsevier
Abstract The Internet of Things (IoT) is a network that interconnects many everyday objects,
including computers, televisions, washing machines, and even whole urban areas. These …

StriD²FA: Scalable Regular Expression Matching for Deep Packet Inspection

X Wang, J Jiang, Y Tang, B Liu… - 2011 IEEE International …, 2011 - ieeexplore.ieee.org
Deep packet inspection (DPI) has become one of the key components of a Network Intrusion
Detection System (NIDS) and it compares packet content to a set of rules written in regular …

A learning oriented DLP system based on classification model

K Gupta, A Kush - arXiv preprint arXiv:2312.13711, 2023 - arxiv.org
Data is the key asset for organizations and data sharing is lifeline for organization growth;
which may lead to data loss. Data leakage is the most critical issue being faced by …

Strifa: Stride finite automata for high-speed regular expression matching in network intrusion detection systems

X Wang, Y Xu, J Jiang, O Ormond, B Liu… - IEEE Systems …, 2013 - ieeexplore.ieee.org
Deep packet inspection has become a key component in network intrusion detection
systems (NIDSes), where every packet in the incoming data stream needs to be compared …

A prefiltering approach to regular expression matching for network security systems

T Liu, Y Sun, AX Liu, L Guo, B Fang - … ACNS 2012, Singapore, June 26-29 …, 2012 - Springer
Regular expression (RegEx) matching has been widely used in various networking and
security applications. Despite much effort on this important problem, it remains a …