[[abstract]]The overall performance of an intrusion protection system depends not only on the packet header classification and pattern matching, but also on the post-operative determination of correlative patterns of matched rules. An increasing number of patterns associated with a rule heighten the importance of correlative pattern matching. This work proposes a TCAM-based smart architecture that supports both deep pattern-matching and correlative pattern-matching. The proposed architecture overcomes the difficulties in implementing TCAM when the patterns are very deep and the rules for packet payload involve many patterns whose positions lie within a range. A real case payload is simulated using a Snort 2.3 rule set and simulation results...
Abstract—Pattern matching is one of the most important components for the content inspection based a...
[[abstract]]As more and more network security threats are emerging today, the network-based intrusio...
In intrusion detection among different hardware approaches, memory-based architecture has attracted ...
[[abstract]]Network intrusion detection system is used to inspect packet contents against thousands ...
High-performance intrusion detection and prevention systems are needed by network administrators in ...
[[abstract]]As the Internet grows at a very rapid pace, so does the incidence of attack events and d...
Abstract—A rule-based intrusion detection system compares the incoming packets against rule set in o...
The survivability of the future Internet is largely dependent on whether it will be able to successf...
Abstract- Today's packet classification systems are designed to provide the highest priority ma...
It is becoming increasingly common for network devices to handle packets based on the contents of pa...
[[abstract]]Due to the advantages of easy re-configurability and scalability, the memory-based strin...
Abstract—With the increasing growth of the Internet, the explosion of attacks and viruses significan...
Abstract—Because of its accuracy, pattern matching technique has recently been applied to Internet s...
Cyber intrusions have become a serious problem with growing frequency and complexity. Current Intrus...
Increases in network traffic volume and transmission speeds have given rise to the need for extremel...
Abstract—Pattern matching is one of the most important components for the content inspection based a...
[[abstract]]As more and more network security threats are emerging today, the network-based intrusio...
In intrusion detection among different hardware approaches, memory-based architecture has attracted ...
[[abstract]]Network intrusion detection system is used to inspect packet contents against thousands ...
High-performance intrusion detection and prevention systems are needed by network administrators in ...
[[abstract]]As the Internet grows at a very rapid pace, so does the incidence of attack events and d...
Abstract—A rule-based intrusion detection system compares the incoming packets against rule set in o...
The survivability of the future Internet is largely dependent on whether it will be able to successf...
Abstract- Today's packet classification systems are designed to provide the highest priority ma...
It is becoming increasingly common for network devices to handle packets based on the contents of pa...
[[abstract]]Due to the advantages of easy re-configurability and scalability, the memory-based strin...
Abstract—With the increasing growth of the Internet, the explosion of attacks and viruses significan...
Abstract—Because of its accuracy, pattern matching technique has recently been applied to Internet s...
Cyber intrusions have become a serious problem with growing frequency and complexity. Current Intrus...
Increases in network traffic volume and transmission speeds have given rise to the need for extremel...
Abstract—Pattern matching is one of the most important components for the content inspection based a...
[[abstract]]As more and more network security threats are emerging today, the network-based intrusio...
In intrusion detection among different hardware approaches, memory-based architecture has attracted ...