Bit-split string-matching engines for intrusion detection and prevention
暂无分享,去创建一个
[1] Viktor K. Prasanna,et al. Time and area efficient pattern matching on FPGAs , 2004, FPGA '04.
[2] Martin Roesch,et al. Snort - Lightweight Intrusion Detection for Networks , 1999 .
[3] Steve Poole,et al. Granidt: Towards Gigabit Rate Network Intrusion Detection Technology , 2002, FPL.
[4] Dan S. Wallach,et al. Denial of Service via Algorithmic Complexity Attacks , 2003, USENIX Security Symposium.
[5] Alfred V. Aho,et al. Efficient string matching , 1975, Commun. ACM.
[6] Bruce J. McKenzie. Fast Peephole Optimization Techniques , 1989, Softw. Pract. Exp..
[7] Dionisios N. Pnevmatikatos,et al. Pre-decoded CAMs for efficient and high-speed NIDS pattern matching , 2004, 12th Annual IEEE Symposium on Field-Programmable Custom Computing Machines.
[8] Walid Dabbous,et al. Survey and taxonomy of IP address lookup algorithms , 2001, IEEE Netw..
[9] George Varghese,et al. Applying Fast String Matching to Intrusion Detection , 2001 .
[10] William H. Mangione-Smith,et al. Specialized Hardware for Deep Network Packet Filtering , 2002, FPL.
[11] Andrew S. Tanenbaum,et al. Using Peephole Optimization on Intermediate Code , 1982, TOPL.
[12] Norman P. Jouppi,et al. Cacti 3. 0: an integrated cache timing, power, and area model , 2001 .
[13] William H. Mangione-Smith,et al. Deep packet filter with dedicated logic and read only memories , 2004, 12th Annual IEEE Symposium on Field-Programmable Custom Computing Machines.
[14] George Varghese,et al. Automated Worm Fingerprinting , 2004, OSDI.
[15] Robert S. Boyer,et al. A fast string searching algorithm , 1977, CACM.
[16] Brad L. Hutchings,et al. Assisting network intrusion detection with reconfigurable hardware , 2002, Proceedings. 10th Annual IEEE Symposium on Field-Programmable Custom Computing Machines.
[17] 36th International Symposium on Microarchitecture , 2003, Proceedings. 36th Annual IEEE/ACM International Symposium on Microarchitecture, 2003. MICRO-36..
[18] John W. Lockwood,et al. Deep packet inspection using parallel Bloom filters , 2003, 11th Symposium on High Performance Interconnects, 2003. Proceedings..
[19] George Varghese,et al. Fast Content-Based Packet Handling for Intrusion Detection , 2001 .
[20] V. Srinivasan,et al. Fast address lookups using controlled prefix expansion , 1999, TOCS.
[21] Christopher R. Clark,et al. Efficient Reconfigurable Logic Circuits for Matching Complex Network Intrusion Detection Patterns , 2003, FPL.
[22] William J. Dally,et al. Smart Memories: a modular reconfigurable architecture , 2000, ISCA '00.
[23] Jun Xu,et al. Architecture Support for Defending Against Buffer Overflow Attacks , 2002 .
[24] Paul D. Franzon,et al. Configurable string matching hardware for speeding up intrusion detection , 2005, CARN.
[25] Navjot Singh,et al. Transparent Run-Time Defense Against Stack-Smashing Attacks , 2000, USENIX Annual Technical Conference, General Track.
[26] Viktor K. Prasanna,et al. A methodology for synthesis of efficient intrusion detection systems on FPGAs , 2004, 12th Annual IEEE Symposium on Field-Programmable Custom Computing Machines.
[27] George Varghese,et al. Deterministic memory-efficient string matching algorithms for intrusion detection , 2004, IEEE INFOCOM 2004.
[28] Nick McKeown,et al. Algorithms for packet classification , 2001, IEEE Netw..
[29] Henry Hoffmann,et al. Evaluation of the Raw microprocessor: an exposed-wire-delay architecture for ILP and streams , 2004, Proceedings. 31st Annual International Symposium on Computer Architecture, 2004..