Many devices currently connect to the internet. Some are pretty well secured, while others lack security due to bugs or other vulnerabilities. A scanner searches for available services on the internet or computer host using standard network protocols. An adversary uses a scanner to search for leaks in security. However, scanners encode their network traffic with a specific XOR pattern, also called a fingerprint of the scanner. However, finding those patterns is very computation-intensive on classical hardware. This thesis aims to use a special FPGA, namely a DFE, to find the fingerprints at a higher speed of 10 GBits/s. Additionally, it aims to find the limits of this DFE in terms of computation power and speed. We created a performance mod...
In this article we address the problem of efficient and secure monitoring of computer network traffi...
International audienceThis paper presents a new high performance hardware implementation of a string...
Nilsimsa algorithm is a very effective spam fingerprinting technique. This spam fingerprinting algor...
Biometric technologies are becoming the foundation of an extensive array of highly secure identifica...
Summarization: Intrusion Detection Systems such as Snort scan incoming packets for evidence of secur...
We will introduce a way how we can achieve high speed homology search by only adding one off-the-she...
International audienceStream processing has become extremely popular for analyzing huge volumes of d...
Network speeds and bandwidths have improved over time. However, the frequency of network attacks and...
With ever increasing network speed, scalable and reliable detection of network port scans has become...
Deep Packet Inspection (DPI) involves searching a packet's header and payload against thousands of r...
Malicious attacks and threats over network can be identified and prevented by Intrusion detection sy...
Network feature extraction involves the storage and classification of network packet activity. Altho...
[[abstract]]With the appearance of multi-gigabit network infrastructure, a typical network intrusion...
Deep packet inspection Content-based detection GPU computing a b s t r a c t Internet traffic monito...
Abstract. Most modern security protocols and security applications are dened to be algorithm indepen...
In this article we address the problem of efficient and secure monitoring of computer network traffi...
International audienceThis paper presents a new high performance hardware implementation of a string...
Nilsimsa algorithm is a very effective spam fingerprinting technique. This spam fingerprinting algor...
Biometric technologies are becoming the foundation of an extensive array of highly secure identifica...
Summarization: Intrusion Detection Systems such as Snort scan incoming packets for evidence of secur...
We will introduce a way how we can achieve high speed homology search by only adding one off-the-she...
International audienceStream processing has become extremely popular for analyzing huge volumes of d...
Network speeds and bandwidths have improved over time. However, the frequency of network attacks and...
With ever increasing network speed, scalable and reliable detection of network port scans has become...
Deep Packet Inspection (DPI) involves searching a packet's header and payload against thousands of r...
Malicious attacks and threats over network can be identified and prevented by Intrusion detection sy...
Network feature extraction involves the storage and classification of network packet activity. Altho...
[[abstract]]With the appearance of multi-gigabit network infrastructure, a typical network intrusion...
Deep packet inspection Content-based detection GPU computing a b s t r a c t Internet traffic monito...
Abstract. Most modern security protocols and security applications are dened to be algorithm indepen...
In this article we address the problem of efficient and secure monitoring of computer network traffi...
International audienceThis paper presents a new high performance hardware implementation of a string...
Nilsimsa algorithm is a very effective spam fingerprinting technique. This spam fingerprinting algor...