String matching algorithms are an important piece in the network intrusion detection systems. In these systems, the chain coincidence algorithms occupy more than half the CPU process time. The GPU technology has sh ow ed in the past years to have a superior performance on these types of applications than the CPU. In this article we perform a review of the state of the art of the different string matching algorithms used in network intrusion detection systems; and also some research done about CPU and GPU on this area.String matching algorithms are an important piece in the network intrusion detection systems. In these systems, the chain coincidence algorithms occupy more than half the CPU process time. The GPU technology has sh ow ed in t...
Abstract — In this paper we present a hardware architecture for string matching. Our solution based ...
Includes bibliographical references (pages 71-75)Intrusion Detection Systems (IDSs) have become an i...
The large quantities of data now being transferred via high-speed networks have made deep packet ins...
[[abstract]]Network Intrusion Detection System has been widely used to protect computer systems from...
String matching algorithms are computationally intensive operations in computer science. The algorit...
Graphics Processing Units (GPUs) were developed for graphics processing and it was not highly-parall...
Abstract. Network security is very important for Internet-connected hosts because of the widespread ...
Network security is very important for Internet-connected hosts because of the widespread of worms, ...
Abstract—With the rapid development of network hardware technologies and network bandwidth, the high...
[[abstract]]©2008 IEEE-By the development of network applications, network security issues are getti...
Since frequent communication between applications takes place in high speed networks, deep packet in...
Pattern Matching is a computationally intensive task used in many research fields and real world app...
ABSTRACT: Intrusion Detection Systems (IDSs) have become widely recognized as powerful tools for ide...
Intrusion detection systems are promising techniques to improve internet security. A daunting challe...
Abstract — Pattern Matching is a very computationally intensive operation in the Network Intrusion d...
Abstract — In this paper we present a hardware architecture for string matching. Our solution based ...
Includes bibliographical references (pages 71-75)Intrusion Detection Systems (IDSs) have become an i...
The large quantities of data now being transferred via high-speed networks have made deep packet ins...
[[abstract]]Network Intrusion Detection System has been widely used to protect computer systems from...
String matching algorithms are computationally intensive operations in computer science. The algorit...
Graphics Processing Units (GPUs) were developed for graphics processing and it was not highly-parall...
Abstract. Network security is very important for Internet-connected hosts because of the widespread ...
Network security is very important for Internet-connected hosts because of the widespread of worms, ...
Abstract—With the rapid development of network hardware technologies and network bandwidth, the high...
[[abstract]]©2008 IEEE-By the development of network applications, network security issues are getti...
Since frequent communication between applications takes place in high speed networks, deep packet in...
Pattern Matching is a computationally intensive task used in many research fields and real world app...
ABSTRACT: Intrusion Detection Systems (IDSs) have become widely recognized as powerful tools for ide...
Intrusion detection systems are promising techniques to improve internet security. A daunting challe...
Abstract — Pattern Matching is a very computationally intensive operation in the Network Intrusion d...
Abstract — In this paper we present a hardware architecture for string matching. Our solution based ...
Includes bibliographical references (pages 71-75)Intrusion Detection Systems (IDSs) have become an i...
The large quantities of data now being transferred via high-speed networks have made deep packet ins...