Bloom Filters Optimized Wu-Manber for Intrusion Detection
暂无分享,去创建一个
[1] Jie Wu,et al. A DFA with Extended Character-Set for Fast Deep Packet Inspection , 2011, IEEE Transactions on Computers.
[2] Monther Aldwairi,et al. Application of artificial bee colony for intrusion detection systems , 2015, Secur. Commun. Networks.
[3] Daniel Sunday,et al. A very fast substring search algorithm , 1990, CACM.
[4] Krerk Piromsopa,et al. Applying KSE-test and K-means clustering towards scalable unsupervised intrusion detection , 2015, 2015 12th International Joint Conference on Computer Science and Software Engineering (JCSSE).
[5] George Varghese,et al. Carousel: Scalable Logging for Intrusion Prevention Systems , 2010, NSDI.
[6] Xin Zhang,et al. Algorithms to speedup pattern matching for network intrusion detection systems , 2015, Comput. Commun..
[7] Hossein Gharaee,et al. A survey of pattern matching algorithm in intrusion detection system , 2014, 7'th International Symposium on Telecommunications (IST'2014).
[8] Cui Yong,et al. An improved Wu-Manber multiple patterns matching algorithm , 2006, 2006 IEEE International Performance Computing and Communications Conference.
[9] Jae-Kook Lee,et al. Improved Pattern Matching Method for Intrusion Detection Systems under DDoS Attack , 2015 .
[10] Lei Li,et al. WM+: An Optimal Multi-pattern String Matching Algorithm Based on the WM Algorithm , 2005, APPT.
[11] John W. Lockwood,et al. Deep packet inspection using parallel bloom filters , 2004, IEEE Micro.
[12] Justin Zobel,et al. Performance in Practice of String Hashing Functions , 1997, DASFAA.
[13] Burton H. Bloom,et al. Space/time trade-offs in hash coding with allowable errors , 1970, CACM.
[14] Udi Manber,et al. A FAST ALGORITHM FOR MULTI-PATTERN SEARCHING , 1999 .
[15] Zhan Peng,et al. An Improved Multi-pattern Matching Algorithm for Large-Scale Pattern Sets , 2014, 2014 Tenth International Conference on Computational Intelligence and Security.
[16] Paul D. Franzon,et al. Configurable string matching hardware for speeding up intrusion detection , 2005, CARN.
[17] Monther Aldwairi,et al. Exscind: Fast pattern matching for intrusion detection using exclusion and inclusion filters , 2011, 2011 7th International Conference on Next Generation Web Services Practices.
[18] Monther Aldwairi,et al. Exhaust: Optimizing Wu-Manber pattern matching for intrusion detection using Bloom filters , 2015, 2015 2nd World Symposium on Web Applications and Networking (WSWAN).
[19] Paul D. Franzon,et al. Hardware-efficient pattern matching algorithms and architectures for fast intrusion detection , 2006 .
[20] Martin Roesch,et al. Snort - Lightweight Intrusion Detection for Networks , 1999 .
[21] Alfred V. Aho,et al. Efficient string matching , 1975, Commun. ACM.
[22] Li Fan,et al. Summary cache: a scalable wide-area web cache sharing protocol , 2000, TNET.
[23] Evangelos P. Markatos,et al. Generating realistic workloads for network intrusion detection systems , 2004, WOSP '04.
[24] Monther Aldwairi,et al. Function and Data Parallelization of Wu-Manber Pattern Matching for Intrusion Detection Systems , 2012, Netw. Protoc. Algorithms.
[25] Robert S. Boyer,et al. A fast string searching algorithm , 1977, CACM.