A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
A High-Throughput System Architecture for Deep Packet Filtering in Network Intrusion Prevention
[chapter]
2006
Lecture Notes in Computer Science
Pattern matching is one of critical parts of Network Intrusion Prevention Systems (NIPS). Pattern matching hardware for NIPS should find a matching pattern at wire speed. ...
We modify Shift-OR hardware accelerator and propose a system architectures to meet the above requirement. ...
Conclusion In Network Intrusion Prevention Systems (NIPS), pattern matching is extensively used to find attack signatures in a payload and is the most computationally intensive part of the execution. ...
doi:10.1007/11682127_29
fatcat:v5tqtw7cnzbmtkqsrabqag2x4u
Inline stateful and deep inspection for intrusion prevention is becoming more challenging due to the increase in both the volume of network traffic and the complexity of the analysis requirements. ...
In this work, we pursue a novel architectural approach, named SANS, which takes both the advantage of new generation network processors for packet-header-based processing and the advantage of commodity ...
INTRODUCTION The difficulties of building high performance network intrusion prevention systems (NIPS) stem mainly from the fact that NIPS needs to analyze not only packet headers but also packet payload ...
doi:10.1145/1882486.1882532
dblp:conf/ancs/HeQXL09
fatcat:oefjfqg35rbjhbjj5ea2jg7od4
A Survey on Deep Packet Inspection for Intrusion Detection Systems
[article]
2008
arXiv
pre-print
Deep packet inspection is widely recognized as a powerful way which is used for intrusion detection systems for inspecting, deterring and deflecting malicious attacks over the network. ...
In this paper, we survey the deep packet inspection implementations techniques, research challenges and algorithms. Finally, we provide a comparison between the different applied systems. ...
, high performance firewall functions and finally in network intrusion detection system (NIDS) and network prevention system (NIPS) that depend on DPI techniques. ...
arXiv:0803.0037v1
fatcat:5smjxqskfrejnity326r6rjxgu
GDPI: Signature based Deep Packet Inspection using GPUs
2017
International Journal of Advanced Computer Science and Applications
Deep Packet Inspection (DPI) is necessitated for many networked application systems in order to prevent from cyber threats. ...
The signature based Network Intrusion and Detection System (NIDS) works on packet inspection and pattern matching mechanisms for the detection of malicious content in network traffic. ...
High Performance Intrusion Detection Network Intrusion Detection systems (NIDS) are well known source for monitoring inbound and outbound network traffics in order to prevent from DDOS and other types ...
doi:10.14569/ijacsa.2017.081128
fatcat:hrzim6u7efaedjvinb3luumfqe
High performance encrypted network traffic inspection using hardware accelerators
2018
Zenodo
Poster presented at the 14th International Conference on emerging Networking EXperiments and Technologies (CoNEXT 2018). ...
• Preprocesses patterns to build a state
machine
• Simultaneous multipattern searching
• Processes the input in a single pass
• Pattern searching can be transferred to
GPU to achieve high throughput ...
This framework can be used to build
different network related applications, such as
firewalls, L7 filtering, or an Intrusion Detection
System.
The signatures are processed into an automaton. ...
doi:10.5281/zenodo.2635459
fatcat:hbj2pgy4bfgsjjb73vsoxnjq5q
IP routing processing with graphic processors
2010
2010 Design, Automation & Test in Europe Conference & Exhibition (DATE 2010)
For the deep packet inspection application, we implemented both a Bloom-filter based string matching algorithm and a finite automata based regular expression matching algorithm. ...
Current high performance routers depend on proprietary hardware solutions, which make it difficult to adapt to ever-changing network protocols. ...
[24] reported that signature matching alone accounts for approximately 60% of the processing time in the Snort Intrusion Prevention System [2] . ...
doi:10.1109/date.2010.5457229
dblp:conf/date/MuZZLDZ10
fatcat:lptjskmrzbddxirs4ighke3oqe
Implementing Intrusion Detection System for Multicore Processor
2009
2009 International Conference on Advances in Recent Technologies in Communication and Computing
In this paper, we present new architecture for multi-core supported Intrusion Detection System, which aims at providing network security processing without causing performance penalty to normal network ...
The Intrusion Detection System that we Presented in this paper also protect the multi core systems from Real Time attacks and Packet Filtrations with high performance without any penalty. ...
Shallow packet inspection is a form of computer network packet filtering that examines only the header part of a packet. ...
doi:10.1109/artcom.2009.44
dblp:conf/artcom/RajeswariN09
fatcat:nbc6yirovvhizidphczu22e7ay
GPU-accelerated encrypted network traffic inspection
2019
Zenodo
Common applications of DPI include but are not limited to firewalls, intrusion detection and prevention systems, L7 filtering and packet forwarding. ...
Traditional DPI implementations can only extract very coarse-grained information for the majority of encrypted traffic, even though its analysis is a core operation for many network systems. ...
Common applications of DPI include but are not limited to firewalls, intrusion detection and prevention systems, L7 filtering and packet forwarding. ...
doi:10.5281/zenodo.3472928
fatcat:zcc2hou37jdrnj4xzdjgtpajoa
We outline application scenarios in which a hybrid architecture of optical and digital parts, like the one we propose in this paper, can offer significant benefit to the network from a security perspective ...
A very fast network composed by not as fast processors is unable to perform basic operations needed in the security field, like firewalling and intrusion detection. ...
ACKNOWLEDGEMENTS We thank the anonymous reviewers for their valuable comments. We would also like to thank Lubomir Stroetmann, who contributed to this project while interning with FORTH. ...
doi:10.1145/1519144.1519148
dblp:conf/eurosec/AthanasopoulosKKMPMWKC09
fatcat:zqkqk4hgxngbpmcihx7nsj2bqm
Hardware Architecture of a Parallel Pattern Matching Engine
2007
2007 IEEE International Symposium on Circuits and Systems
Several network security and QoS applications require detecting multiple string matches in the packet payload by comparing it against predefined pattern set. ...
recover from a failed partial match, the throughput of the system does not degrade with the increase in the number of patterns or the length of the patterns to be matched. ...
Several networking applications like Network Intrusion Detection Systems (NIDS), Network Intrusion Prevention Systems (NIPS) and Packet Classifiers (PC) perform deep packet inspection to analyze the packet ...
doi:10.1109/iscas.2007.378482
dblp:conf/iscas/YadavVF07
fatcat:hlvwhbn53bexnhju4bsdvyi3aa
MULTI-GIGABIT PATTERN FOR DATA IN NETWORK SECURITY
2013
International journal of computer and communication technology
High-speed network intrusion detection systems (IDS) rely on efficient pattern matching techniques to analyze the packet payload and make decisions on the significance of the packet body. ...
Various techniques have been proposed in past but the performance of the system is reducing because of multi-gigabit rates.Pattern matching is a significant issue in intrusion detection systems, but by ...
Inline intrusion detection system or Intrusion Prevention System (IPS) actively filters exploits from traffic in real time. ...
doi:10.47893/ijcct.2013.1204
fatcat:jx6ewq2me5dyrihyy4zpmkanj4
Novel three-Tier Intrusion Detection and Prevention System in Software Defined Network
2020
IEEE Access
For more information, see https://creativecommons.org/licenses/by/4.0/ VOLUME 8, 2020 A. Ali, M. M. Yousaf: Novel Three-Tier Intrusion Detection and Prevention System in SDN ...
INDEX TERMS SDN security, IoT, intrusion prevention system, RFID, packet classification. 109662 This work is licensed under a Creative Commons Attribution 4.0 License. ...
Hence the need for intrusion detection and prevention system (IDPS) was increased to detect and mitigate the activities of malicious flows [23] . ...
doi:10.1109/access.2020.3002333
fatcat:4ijmba3l55amroazlz6vopei4i
Acceleration of Intrusion Detection in Encrypted Network Traffic Using Heterogeneous Hardware
2021
Sensors
In this work, we present HeaderHunter, a fast signature-based intrusion detection system even for encrypted network traffic. ...
Common applications for DPI include but are not limited to firewalls, intrusion detection and prevention systems, L7 filtering, and packet forwarding. ...
This publication reflects the views only of the authors, and the Commission cannot be held responsible for any use which may be made of the information contained therein. ...
doi:10.3390/s21041140
pmid:33562000
fatcat:cfsytoioujeohglyusbem76ygy
Guest Editorial Deep Packet Inspection: Algorithms, Hardware, and Applications
2014
IEEE Journal on Selected Areas in Communications
Furthermore, the solutions usually should operate in real time in a high-speed network, while dealing with the above complexity. ...
D EEP packet inspection (DPI) examines the content in packet payloads to search for signatures of network applications, signs of malicious activities, and leaks of sensitive information, rather than just ...
The paper "TFA: A Tunable Finite Automaton for Pattern Matching in Network Intrusion Detection Systems" by Yang Xu, Junchen Jiang, Rihua Wei, Yang Song, and H. ...
doi:10.1109/jsac.2014.2371093
fatcat:ze5m5gzosvhbjgyrp63pen5rta
Regular Expression Matching on Graphics Hardware for Intrusion Detection
[chapter]
2009
Lecture Notes in Computer Science
The expressive power of regular expressions has been often exploited in network intrusion detection systems, virus scanners, and spam filtering applications. ...
We demonstrate the feasibility of GPU regular expression matching by implementing it in the popular Snort intrusion detection system, which results to a 60% increase in the packet processing throughput ...
Acknowledgments This work was supported in part by the Marie Curie Actions -Reintegration Grants project PASS. Giorgos Vasiliadis, Michalis Polychronakis, Spiros Antonatos, Evangelos P. ...
doi:10.1007/978-3-642-04342-0_14
fatcat:tltn2m5vijf2xkb2b2zrws74ke
« Previous
Showing results 1 — 15 out of 1,307 results