Because of its flexibility and high performance, reconfigurable logic functions implemented on the Field-programmable Port Extender (FPX ) are well suited for implementing network processing such as packet classification, filtering and intrusion detection functions. This project focuses on two key aspects of the FPX system. One is providing a Gigabit Ethernet interface by designing logic for a FPGA which is located on a line card. Address Resolution Protocol (ARP) packets are handled in hardware and Ethernet frames are processed and transformed into cells suitable for standard FPX application. The other effort is to provide a secure channel to enable remote control and configuration of the FPX system through public internet. A suite of security h...
This paper presents and evaluates a strategy for integrating the Snort network intrusion detection s...
This paper describes the programmable protocol processor (PRO3) architecture, which is capable of su...
This paper presents and evaluates a strategy for integrating the Snort network intrusion detection s...
Because of its flexibility and high performance, reconfigurable logic functions implemented on the Fie...
This paper presents Field Programmable Gate Array (FPGA) powered packet-oriented solution for secure...
Reconfigurable hardware platforms are the key to extensible high speed networks. They provide flexib...
As computer networks increase in speed, it becomes difficult to monitor and manage the transmitted dig...
Abstract—Providing network security is one of the most important tasks in today’s Internet. Unfortun...
Real-Time Ethernet protocols are currently undergoing specification updates to include security feat...
This paper presents a solution for secure remote reconfiguration of FPGAs. Communicating the bitstre...
A prototype platform has been developed that allows pro-cessing of packets at the edge of a multi-gi...
EtherNet/IP is an industrial protocol that is built on top of the TCP/IP protocol suite. Though exte...
The fast extension of inexpensive computer networks has increased the problem of unauthorized access...
Nowadays, the incorporation and constant evolution of communication networks in the electricity sect...
The ongoing increases of line speed in the Internet backbone combined with the need for increased fu...
This paper presents and evaluates a strategy for integrating the Snort network intrusion detection s...
This paper describes the programmable protocol processor (PRO3) architecture, which is capable of su...
This paper presents and evaluates a strategy for integrating the Snort network intrusion detection s...
Because of its flexibility and high performance, reconfigurable logic functions implemented on the Fie...
This paper presents Field Programmable Gate Array (FPGA) powered packet-oriented solution for secure...
Reconfigurable hardware platforms are the key to extensible high speed networks. They provide flexib...
As computer networks increase in speed, it becomes difficult to monitor and manage the transmitted dig...
Abstract—Providing network security is one of the most important tasks in today’s Internet. Unfortun...
Real-Time Ethernet protocols are currently undergoing specification updates to include security feat...
This paper presents a solution for secure remote reconfiguration of FPGAs. Communicating the bitstre...
A prototype platform has been developed that allows pro-cessing of packets at the edge of a multi-gi...
EtherNet/IP is an industrial protocol that is built on top of the TCP/IP protocol suite. Though exte...
The fast extension of inexpensive computer networks has increased the problem of unauthorized access...
Nowadays, the incorporation and constant evolution of communication networks in the electricity sect...
The ongoing increases of line speed in the Internet backbone combined with the need for increased fu...
This paper presents and evaluates a strategy for integrating the Snort network intrusion detection s...
This paper describes the programmable protocol processor (PRO3) architecture, which is capable of su...
This paper presents and evaluates a strategy for integrating the Snort network intrusion detection s...