Ultra-high throughput string matching for Deep Packet Inspection
暂无分享,去创建一个
Zhen Liu | Bin Liu | Xiaojun Wang | Alan Kennedy | Z. Liu | B. Liu | Xiaojun Wang | A. Kennedy
[1] Udi Manber,et al. A FAST ALGORITHM FOR MULTI-PATTERN SEARCHING , 1999 .
[2] Vijay Kumar,et al. High Speed Pattern Matching for Network IDS/IPS , 2006, Proceedings of the 2006 IEEE International Conference on Network Protocols.
[3] T. V. Lakshman,et al. Gigabit rate packet pattern-matching using TCAM , 2004, Proceedings of the 12th IEEE International Conference on Network Protocols, 2004. ICNP 2004..
[4] Donald E. Knuth,et al. Fast Pattern Matching in Strings , 1977, SIAM J. Comput..
[5] Keh-Yih Su,et al. An Efficient Algorithm for Matching Multiple Patterns , 1993, IEEE Trans. Knowl. Data Eng..
[6] David Moore,et al. Code-Red: a case study on the spread and victims of an internet worm , 2002, IMW '02.
[7] George Varghese,et al. Deterministic memory-efficient string matching algorithms for intrusion detection , 2004, IEEE INFOCOM 2004.
[8] Stefan Savage,et al. Inside the Slammer Worm , 2003, IEEE Secur. Priv..
[9] Youngseok Lee,et al. A multi-gigabit rate deep packet inspection algorithm using TCAM , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..
[10] John W. Lockwood,et al. Fast and scalable pattern matching for content filtering , 2005, 2005 Symposium on Architectures for Networking and Communications Systems (ANCS).
[11] Martin Roesch,et al. Snort - Lightweight Intrusion Detection for Networks , 1999 .
[12] Maxime Crochemore,et al. Two-way string-matching , 1991, JACM.
[13] Alfred V. Aho,et al. Efficient string matching , 1975, Commun. ACM.
[14] Timothy Sherwood,et al. A high throughput string matching architecture for intrusion detection and prevention , 2005, 32nd International Symposium on Computer Architecture (ISCA'05).
[15] George Varghese,et al. Fast Content-Based Packet Handling for Intrusion Detection , 2001 .
[16] Beate Commentz-Walter,et al. A String Matching Algorithm Fast on the Average , 1979, ICALP.
[17] Evangelos P. Markatos,et al. Generating realistic workloads for network intrusion detection systems , 2004, WOSP '04.
[18] Robert S. Boyer,et al. A fast string searching algorithm , 1977, CACM.