Abstract Deep packet inspection (DPI) scans both packet headers and payloads to search for predefined sig-natures. As link rates and traffic volumes of Internet are constantly growing, DPI is facing the high performance challenge of how to achieve line-speed packet processing with limited embedded memory. The recent trie bitmap content analyzer (TriBiCa) suffers from high update overhead and many false positive memory accesses, while the shared-node fast hash table (SFHT) suffers from high update overhead and large memory requirements. This paper presents an index-split Bloom filter (ISBF) to overcome these issues. Given a set of off-chip items, an index of each item is split apart into several groups of constant bits, and each group of bit...
Hash tables are fundamental components of several network processing algorithms and applications, in...
Deep Packet Inspection (DPI) has been widely adopted in detecting network threats such as intrusion,...
In a content centric network, packet forwarding is performed over data names instead of IP addresses...
Recent advances in network packet processing focus on payload inspection for applications that inclu...
Abstract — Deep Packet Inspection (DPI) plays a major role in contemporary networks, and specificall...
The rapid growth of the Internet leads to a massive spread of malicious attacks like viruses and mal...
Abstract—Deep packet inspection (DPI) is often used in net-work intrusion detection and prevention s...
Deep Packet Inspection (DPI) involves searching a packet's header and payload against thousands of r...
Deep packet inspection (DPI) represents the major process in network intrusion detection and prevent...
The emergence of new optical transmission technologies has led to ultra-high Giga bits per second (G...
Deep packet inspection (DPI) provides the ability to perform quality of service (QoS) and Intrusion ...
As an efficient data structure for membership testing, the Bloom filter has found wide applications ...
High-speed packet content inspection and filtering devices rely on a fast multi-pattern matching alg...
Packet classification is an enabling function in network and security systems; hence, hardware-based...
Abstract. The analysis of packet payload is mandatory for network security and traffic monitoring ap...
Hash tables are fundamental components of several network processing algorithms and applications, in...
Deep Packet Inspection (DPI) has been widely adopted in detecting network threats such as intrusion,...
In a content centric network, packet forwarding is performed over data names instead of IP addresses...
Recent advances in network packet processing focus on payload inspection for applications that inclu...
Abstract — Deep Packet Inspection (DPI) plays a major role in contemporary networks, and specificall...
The rapid growth of the Internet leads to a massive spread of malicious attacks like viruses and mal...
Abstract—Deep packet inspection (DPI) is often used in net-work intrusion detection and prevention s...
Deep Packet Inspection (DPI) involves searching a packet's header and payload against thousands of r...
Deep packet inspection (DPI) represents the major process in network intrusion detection and prevent...
The emergence of new optical transmission technologies has led to ultra-high Giga bits per second (G...
Deep packet inspection (DPI) provides the ability to perform quality of service (QoS) and Intrusion ...
As an efficient data structure for membership testing, the Bloom filter has found wide applications ...
High-speed packet content inspection and filtering devices rely on a fast multi-pattern matching alg...
Packet classification is an enabling function in network and security systems; hence, hardware-based...
Abstract. The analysis of packet payload is mandatory for network security and traffic monitoring ap...
Hash tables are fundamental components of several network processing algorithms and applications, in...
Deep Packet Inspection (DPI) has been widely adopted in detecting network threats such as intrusion,...
In a content centric network, packet forwarding is performed over data names instead of IP addresses...