The large quantities of data now being transferred via high-speed networks have made deep packet inspection indispensable for security purposes. Scalable and low-cost signa-ture-based network intrusion detection systems have been developed for deep packet inspection for various software platforms. Traditional approaches that only involve central processing units (CPUs) are now considered inadequate in terms of inspection speed. Graphic processing units (GPUs) have superior parallel processing power, but transmission bottlenecks can reduce optimal GPU efficiency. In this paper we describe our proposal for a hybrid CPU/GPU pattern-matching algorithm (HPMA) that divides and distributes the packet-inspecting workload between a CPU and GPU. All ...
[[abstract]]Network Intrusion Detection System has been widely used to protect computer systems from...
As part of network security processes, network intrusion detection systems (NIDSs) determine whether...
Statistics show that more than 60% of the Internet traffic is now encrypted, while this percentage i...
The large quantities of data now being transferred via high-speed networks have made deep packet ins...
Since frequent communication between applications takes place in high speed networks, deep packet in...
Abstract—With the rapid development of network hardware technologies and network bandwidth, the high...
[[abstract]]Network Intrusion Detection Systems (NIDS) have been widely used to protect computer sys...
[[abstract]]©2008 IEEE-By the development of network applications, network security issues are getti...
Large industrial systems that combine services and applications, have become targets for cyber crimi...
Deep packet inspection Content-based detection GPU computing a b s t r a c t Internet traffic monito...
Pattern matching is an important task in a plethora of different fields ranging from computer scienc...
String matching algorithms are an important piece in the network intrusion detection systems. In the...
Pattern Matching is a computationally intensive task used in many research fields and real world app...
This dissertation deals with essential issues pertaining to high performance processing for network ...
A novel type of 'recognition engine' chip may revolutionize the detection of electronic intruders. A...
[[abstract]]Network Intrusion Detection System has been widely used to protect computer systems from...
As part of network security processes, network intrusion detection systems (NIDSs) determine whether...
Statistics show that more than 60% of the Internet traffic is now encrypted, while this percentage i...
The large quantities of data now being transferred via high-speed networks have made deep packet ins...
Since frequent communication between applications takes place in high speed networks, deep packet in...
Abstract—With the rapid development of network hardware technologies and network bandwidth, the high...
[[abstract]]Network Intrusion Detection Systems (NIDS) have been widely used to protect computer sys...
[[abstract]]©2008 IEEE-By the development of network applications, network security issues are getti...
Large industrial systems that combine services and applications, have become targets for cyber crimi...
Deep packet inspection Content-based detection GPU computing a b s t r a c t Internet traffic monito...
Pattern matching is an important task in a plethora of different fields ranging from computer scienc...
String matching algorithms are an important piece in the network intrusion detection systems. In the...
Pattern Matching is a computationally intensive task used in many research fields and real world app...
This dissertation deals with essential issues pertaining to high performance processing for network ...
A novel type of 'recognition engine' chip may revolutionize the detection of electronic intruders. A...
[[abstract]]Network Intrusion Detection System has been widely used to protect computer systems from...
As part of network security processes, network intrusion detection systems (NIDSs) determine whether...
Statistics show that more than 60% of the Internet traffic is now encrypted, while this percentage i...