[[abstract]]©2008 IEEE-By the development of network applications, network security issues are getting more and more important. This paper proposes a multiple-pattern matching algorithm for the network intrusion detection systems based on the GPU (Graphics Processing Units). The highly parallelism of the GPU computation power is used to inspect the packet content in parallel. The performance of the proposed approach is analyzed through evaluations such as using various texture formats and different implementations. Experimental results indicate that the performance of the proposed approach is twice of that of the modified Wu-Manber algorithm used in Snort. The proposed approach makes a commodity and cheap GPU card as a high performance patt...
As part of network security processes, network intrusion detection systems (NIDSs) determine whether...
Deep packet inspection is becoming prevalent for modern network processing systems. They inspect pac...
At the heart of almost every modern Network Intrusion Detection System (NIDS), there is a pattern ma...
Abstract—With the rapid development of network hardware technologies and network bandwidth, the high...
[[abstract]]Network Intrusion Detection Systems (NIDS) have been widely used to protect computer sys...
The large quantities of data now being transferred via high-speed networks have made deep packet ins...
Since frequent communication between applications takes place in high speed networks, deep packet in...
Abstract — Pattern Matching is a very computationally intensive operation in the Network Intrusion d...
Pattern Matching is a computationally intensive task used in many research fields and real world app...
[[abstract]]Network Intrusion Detection System has been widely used to protect computer systems from...
[[abstract]]Regular Expression has been widely used in Network Intrusion Detection Systems (NIDS) to...
[[abstract]]Graphics processing units (GPUs) have attracted a lot of attention due to their cost-eff...
Abstract—Network Intrusion Detection System (NIDS) is a system developed for identifying attacks by ...
String matching algorithms are an important piece in the network intrusion detection systems. In the...
The large quantities of data now being transferred via high-speed networks have made deep packet ins...
As part of network security processes, network intrusion detection systems (NIDSs) determine whether...
Deep packet inspection is becoming prevalent for modern network processing systems. They inspect pac...
At the heart of almost every modern Network Intrusion Detection System (NIDS), there is a pattern ma...
Abstract—With the rapid development of network hardware technologies and network bandwidth, the high...
[[abstract]]Network Intrusion Detection Systems (NIDS) have been widely used to protect computer sys...
The large quantities of data now being transferred via high-speed networks have made deep packet ins...
Since frequent communication between applications takes place in high speed networks, deep packet in...
Abstract — Pattern Matching is a very computationally intensive operation in the Network Intrusion d...
Pattern Matching is a computationally intensive task used in many research fields and real world app...
[[abstract]]Network Intrusion Detection System has been widely used to protect computer systems from...
[[abstract]]Regular Expression has been widely used in Network Intrusion Detection Systems (NIDS) to...
[[abstract]]Graphics processing units (GPUs) have attracted a lot of attention due to their cost-eff...
Abstract—Network Intrusion Detection System (NIDS) is a system developed for identifying attacks by ...
String matching algorithms are an important piece in the network intrusion detection systems. In the...
The large quantities of data now being transferred via high-speed networks have made deep packet ins...
As part of network security processes, network intrusion detection systems (NIDSs) determine whether...
Deep packet inspection is becoming prevalent for modern network processing systems. They inspect pac...
At the heart of almost every modern Network Intrusion Detection System (NIDS), there is a pattern ma...