A High Throughput String Matching Architecture for Intrusion Detection and Prevention
暂无分享,去创建一个
[1] V. Srinivasan,et al. Fast address lookups using controlled prefix expansion , 1999, TOCS.
[2] Walid Dabbous,et al. Survey and taxonomy of IP address lookup algorithms , 2001, IEEE Netw..
[3] George Varghese,et al. Automated Worm Fingerprinting , 2004, OSDI.
[4] William H. Mangione-Smith,et al. Specialized Hardware for Deep Network Packet Filtering , 2002, FPL.
[5] Viktor K. Prasanna,et al. A methodology for synthesis of efficient intrusion detection systems on FPGAs , 2004, 12th Annual IEEE Symposium on Field-Programmable Custom Computing Machines.
[6] Andrew S. Tanenbaum,et al. Using Peephole Optimization on Intermediate Code , 1982, TOPL.
[7] George Varghese,et al. Fast Content-Based Packet Handling for Intrusion Detection , 2001 .
[8] Christopher R. Clark,et al. Efficient Reconfigurable Logic Circuits for Matching Complex Network Intrusion Detection Patterns , 2003, FPL.
[9] Sarang Dharmapurikar,et al. Implementation results of bloom filters for string matching , 2004, 12th Annual IEEE Symposium on Field-Programmable Custom Computing Machines.
[10] Martin Roesch,et al. Snort - Lightweight Intrusion Detection for Networks , 1999 .
[11] William J. Dally,et al. Smart Memories: a modular reconfigurable architecture , 2000, ISCA '00.
[12] Jun Xu,et al. Architecture Support for Defending Against Buffer Overflow Attacks , 2002 .
[13] John W. Lockwood,et al. Deep packet inspection using parallel bloom filters , 2004, IEEE Micro.
[14] Alfred V. Aho,et al. Efficient string matching , 1975, Commun. ACM.
[15] Bruce J. McKenzie. Fast Peephole Optimization Techniques , 1989, Softw. Pract. Exp..
[16] William H. Mangione-Smith,et al. Deep packet filter with dedicated logic and read only memories , 2004, 12th Annual IEEE Symposium on Field-Programmable Custom Computing Machines.
[17] Dan S. Wallach,et al. Denial of Service via Algorithmic Complexity Attacks , 2003, USENIX Security Symposium.
[18] Brad L. Hutchings,et al. Assisting network intrusion detection with reconfigurable hardware , 2002, Proceedings. 10th Annual IEEE Symposium on Field-Programmable Custom Computing Machines.
[19] George Varghese,et al. Deterministic memory-efficient string matching algorithms for intrusion detection , 2004, IEEE INFOCOM 2004.
[20] Robert S. Boyer,et al. A fast string searching algorithm , 1977, CACM.
[21] George Varghese,et al. Applying Fast String Matching to Intrusion Detection , 2001 .
[22] Viktor K. Prasanna,et al. Time and area efficient pattern matching on FPGAs , 2004, FPGA '04.
[23] Steve Poole,et al. Granidt: Towards Gigabit Rate Network Intrusion Detection Technology , 2002, FPL.
[24] Nick McKeown,et al. Algorithms for packet classification , 2001, IEEE Netw..
[25] Dionisios N. Pnevmatikatos,et al. Pre-decoded CAMs for efficient and high-speed NIDS pattern matching , 2004, 12th Annual IEEE Symposium on Field-Programmable Custom Computing Machines.
[26] Navjot Singh,et al. Transparent Run-Time Defense Against Stack-Smashing Attacks , 2000, USENIX Annual Technical Conference, General Track.
[27] Henry Hoffmann,et al. Evaluation of the Raw microprocessor: an exposed-wire-delay architecture for ILP and streams , 2004, Proceedings. 31st Annual International Symposium on Computer Architecture, 2004..