Deflating the big bang: fast and scalable deep packet inspection with extended finite automata
暂无分享,去创建一个
Somesh Jha | Randy Smith | Cristian Estan | Shijin Kong | Randy Smith | C. Estan | S. Jha | Shijin Kong | Cristian Estan
[1] John W. Lockwood,et al. Fast and Scalable Pattern Matching for Network Intrusion Detection Systems , 2006, IEEE Journal on Selected Areas in Communications.
[2] T. V. Lakshman,et al. Fast and memory-efficient regular expression matching for deep packet inspection , 2006, 2006 Symposium on Architecture For Networking And Communications Systems.
[3] Jonathan S. Turner,et al. Advanced algorithms for fast and scalable deep packet inspection , 2006, 2006 Symposium on Architecture For Networking And Communications Systems.
[4] Vern Paxson,et al. Bro: a system for detecting network intruders in real-time , 1998, Comput. Networks.
[5] Stephan Merz,et al. Model Checking , 2000 .
[6] Vern Paxson,et al. Active mapping: resisting NIDS evasion without altering traffic , 2003, 2003 Symposium on Security and Privacy, 2003..
[7] Stamatis Vassiliadis,et al. Design of a web switch in a reconfigurable platform , 2006, 2006 Symposium on Architecture For Networking And Communications Systems.
[8] Christopher R. Clark,et al. Scalable pattern matching for high speed networks , 2004, 12th Annual IEEE Symposium on Field-Programmable Custom Computing Machines.
[9] Dionisios N. Pnevmatikatos,et al. Fast, Large-Scale String Match for a 10Gbps FPGA-Based Network Intrusion Detection System , 2003, FPL.
[10] Helen J. Wang,et al. Shield: vulnerability-driven network filters for preventing known vulnerability exploits , 2004, SIGCOMM.
[11] Srihari Cadambi,et al. Memory-Efficient Regular Expression Search Using State Merging , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[12] M. W. Shields. An Introduction to Automata Theory , 1988 .
[13] David A. Patterson,et al. Computer architecture (2nd ed.): a quantitative approach , 1996 .
[14] Patrick Crowley,et al. Algorithms to accelerate multiple regular expressions matching for deep packet inspection , 2006, SIGCOMM.
[15] David A. Patterson,et al. Computer Architecture - A Quantitative Approach, 5th Edition , 1996 .
[16] George Varghese,et al. Curing regular expressions matching algorithms from insomnia, amnesia, and acalculia , 2007, ANCS '07.
[17] Steven S. Muchnick,et al. Advanced Compiler Design and Implementation , 1997 .
[18] Jeffrey D. Ullman,et al. Introduction to Automata Theory, Languages and Computation , 1979 .
[19] Somesh Jha,et al. XFA: Faster Signature Matching with Extended Automata , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[20] Hao Wang,et al. Towards automatic generation of vulnerability-based signatures , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[21] Sriram K. Rajamani,et al. The SLAM project: debugging system software via static analysis , 2002, POPL '02.
[22] David A. Patterson,et al. Computer Architecture: A Quantitative Approach , 1969 .
[23] Timothy Sherwood,et al. A high throughput string matching architecture for intrusion detection and prevention , 2005, 32nd International Symposium on Computer Architecture (ISCA'05).
[24] Vern Paxson,et al. Enhancing byte-level network intrusion detection signatures with context , 2003, CCS '03.
[25] Patrick Crowley,et al. An improved algorithm to accelerate regular expression evaluation , 2007, ANCS '07.
[26] Thomas Henry Ptacek,et al. Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection , 1998 .
[27] Mark Handley,et al. Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics , 2001, USENIX Security Symposium.
[28] Ron K. Cytron,et al. A Scalable Architecture For High-Throughput Regular-Expression Pattern Matching , 2006, 33rd International Symposium on Computer Architecture (ISCA'06).
[29] Somesh Jha,et al. Backtracking Algorithmic Complexity Attacks against a NIDS , 2006, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06).
[30] Alfred V. Aho,et al. Efficient string matching , 1975, Commun. ACM.
[31] George Varghese,et al. Deterministic memory-efficient string matching algorithms for intrusion detection , 2004, IEEE INFOCOM 2004.
[32] Dan S. Wallach,et al. Denial of Service via Algorithmic Complexity Attacks , 2003, USENIX Security Symposium.
[33] S. Hawking. A Brief History of Time: From the Big Bang to Black Holes , 1988 .
[34] Nen-Fu Huang,et al. A fast string-matching algorithm for network processor-based intrusion detection system , 2004, TECS.
[35] Martin Roesch,et al. Snort - Lightweight Intrusion Detection for Networks , 1999 .