Software-based detection techniques are commonly used to identify the predefined signatures in network streams. However, the software-based techniques can not keep up with the speeds that network bandwidth increases. Hence, hardwarebased systems have started to emerge. Bloom filters are frequently used to identify malicious content like viruses in high speed networks. However, architectures proposed to implement Bloom filters are not power efficient. We propose a new Bloom filter architecture that exploits the well-known pipelining technique. Through extensive power analysis we show that pipelining can reduce the power consumption of Bloom filters up to 90 %, which leads to the energy-efficient implementation of network intrusion detection ...
Presented in this paper a scalable bloom filter based prefilter and a hardware-oriented predispatche...
The increasing use of wireless sensor networks, which normally comprise several very small sensor no...
With increasing number and severity of attacks, monitoring ingress and egress network traffic is bec...
Bloom filters are frequently used to identify malicious content like viruses in high speed networks....
Bloom filters are frequently used to identify malicious content like viruses in high speed networks....
Bloom filters are frequently used to identify malicious content like viruses in high speed networks....
This document is made available in accordance with publisher policies. Please cite only the publishe...
Although software based techniques are widely accepted in computer security systems, there is a grow...
Many network security applications require large virus signature sets to be maintained, retrieved, a...
Many network security applications require large virus signature sets to be maintained, retrieved, a...
Abstract—Bloom Filters (BFs) are fundamental building blocks in various network security application...
Abstract—Bloom Filters (BFs) are fundamental building blocks in various network security application...
Standard pattern-matching methods used for deep packet inspection and network security can be evaded...
Abstract—Computers face an ever increasing number of threats from hackers, viruses and other malware...
Presented in this paper a scalable bloom filter based prefilter and a hardware-oriented predispatche...
Presented in this paper a scalable bloom filter based prefilter and a hardware-oriented predispatche...
The increasing use of wireless sensor networks, which normally comprise several very small sensor no...
With increasing number and severity of attacks, monitoring ingress and egress network traffic is bec...
Bloom filters are frequently used to identify malicious content like viruses in high speed networks....
Bloom filters are frequently used to identify malicious content like viruses in high speed networks....
Bloom filters are frequently used to identify malicious content like viruses in high speed networks....
This document is made available in accordance with publisher policies. Please cite only the publishe...
Although software based techniques are widely accepted in computer security systems, there is a grow...
Many network security applications require large virus signature sets to be maintained, retrieved, a...
Many network security applications require large virus signature sets to be maintained, retrieved, a...
Abstract—Bloom Filters (BFs) are fundamental building blocks in various network security application...
Abstract—Bloom Filters (BFs) are fundamental building blocks in various network security application...
Standard pattern-matching methods used for deep packet inspection and network security can be evaded...
Abstract—Computers face an ever increasing number of threats from hackers, viruses and other malware...
Presented in this paper a scalable bloom filter based prefilter and a hardware-oriented predispatche...
Presented in this paper a scalable bloom filter based prefilter and a hardware-oriented predispatche...
The increasing use of wireless sensor networks, which normally comprise several very small sensor no...
With increasing number and severity of attacks, monitoring ingress and egress network traffic is bec...