Network traffic has traditionally exhibited temporal locality in the header field of packets. Such locality is intuitive and is a consequence of the semantics of network protocols. However, in contrast, the locality in the packet payload has not been studied in significant detail. In this work we study temporal locality in the packet payload. Temporal locality can also be viewed as redundancy, and we observe significant redundancy in the packet payload. We investigate mechanisms to exploit it in a networking application. We choose Intrusion Detection Systems (IDS) as a case study. An IDS like the popular Snort operates by scanning packet payload for known attack strings. It first builds a Finite State Machine (FSM) from a database of atta...
It is becoming increasingly common for network de-vices to handle packets based on the contents of p...
The evolving necessity of the Internet increases the demand on the bandwidth. Therefore, this demand...
Intrusion Detection Systems (IDS) have emerged as one of the most promising ways to secure systems i...
Network traffic has traditionally exhibited temporal locality in the header field of packets. Such l...
System security is a prerequisite for efficient day-to-day transactions. As a consequence, Intrusion...
System security is a prerequisite for efficient day-to-day transactions. As a consequence, Intrusion...
Intrusion Detection Systems (IDS) have emerged as one of the most promising ways to secure systems i...
The ever-increasing sophistication in network attacks, combined with larger and larger volumes of tr...
It is becoming increasingly common for network devices to handle packets based on the contents of pa...
Keeping computer networks safe from attack requires ever-increasing vigilance. Our work on applying ...
It is becoming increasingly common for network devices to handle packets based on the contents of pa...
Abstract—A rule-based intrusion detection system compares the incoming packets against rule set in o...
Keeping computer networks safe from attack requires ever-increasing vigilance. Our work on applying ...
Data centers increasingly deploy commodity servers with high-speed network interfaces to enable low-...
Data centers increasingly deploy commodity servers with high-speed network interfaces to enable low-...
It is becoming increasingly common for network de-vices to handle packets based on the contents of p...
The evolving necessity of the Internet increases the demand on the bandwidth. Therefore, this demand...
Intrusion Detection Systems (IDS) have emerged as one of the most promising ways to secure systems i...
Network traffic has traditionally exhibited temporal locality in the header field of packets. Such l...
System security is a prerequisite for efficient day-to-day transactions. As a consequence, Intrusion...
System security is a prerequisite for efficient day-to-day transactions. As a consequence, Intrusion...
Intrusion Detection Systems (IDS) have emerged as one of the most promising ways to secure systems i...
The ever-increasing sophistication in network attacks, combined with larger and larger volumes of tr...
It is becoming increasingly common for network devices to handle packets based on the contents of pa...
Keeping computer networks safe from attack requires ever-increasing vigilance. Our work on applying ...
It is becoming increasingly common for network devices to handle packets based on the contents of pa...
Abstract—A rule-based intrusion detection system compares the incoming packets against rule set in o...
Keeping computer networks safe from attack requires ever-increasing vigilance. Our work on applying ...
Data centers increasingly deploy commodity servers with high-speed network interfaces to enable low-...
Data centers increasingly deploy commodity servers with high-speed network interfaces to enable low-...
It is becoming increasingly common for network de-vices to handle packets based on the contents of p...
The evolving necessity of the Internet increases the demand on the bandwidth. Therefore, this demand...
Intrusion Detection Systems (IDS) have emerged as one of the most promising ways to secure systems i...