Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model
Efficiently detecting network intrusions requires the gathering of sensitive information. This
means that one has to collect large amounts of network transactions including high details of …
means that one has to collect large amounts of network transactions including high details of …
Accelerated deep neural networks for enhanced intrusion detection system
Network based communication is more vulnerable to outsider and insider attacks in recent
days due to its wide spread applications in many fields. Intrusion Detection System (IDS) a …
days due to its wide spread applications in many fields. Intrusion Detection System (IDS) a …
Towards blockchain-enabled single character frequency-based exclusive signature matching in IoT-assisted smart cities
With the increasing viability of Internet of Things (IoT), more devices are expected to be
connected in a smart city environment. It can provide many benefits for people's daily life, but …
connected in a smart city environment. It can provide many benefits for people's daily life, but …
Variable-stride multi-pattern matching for scalable deep packet inspection
Accelerating multi-pattern matching is a critical issue in building high-performance deep
packet inspection systems. Achieving high-throughputs while reducing both memory-usage …
packet inspection systems. Achieving high-throughputs while reducing both memory-usage …
A memory efficient multiple pattern matching architecture for network security
Pattern matching is one of the most important components for the content inspection based
applications of network security, and it requires well designed algorithms and architectures …
applications of network security, and it requires well designed algorithms and architectures …
A memory-efficient pipelined implementation of the aho-corasick string-matching algorithm
D Pao, W Lin, B Liu - ACM Transactions on Architecture and Code …, 2010 - dl.acm.org
With rapid advancement in Internet technology and usages, some emerging applications in
data communications and network security require matching of huge volume of data against …
data communications and network security require matching of huge volume of data against …
[HTML][HTML] A novel privacy preserving user identification approach for network traffic
The prevalence of the Internet and cloud-based applications, alongside the technological
evolution of smartphones, tablets and smartwatches, has resulted in users relying upon …
evolution of smartphones, tablets and smartwatches, has resulted in users relying upon …
A Concise Review of FPGA-Based Hardware Solutions for Network Intrusion Detection
S Hilgurt - 2021 IEEE 8th International Conference on …, 2021 - ieeexplore.ieee.org
A Network Intrusion Detection System (NIDS) is an important part of the state-of-the-art
information security systems. Searching network traffic for a large set of signatures, NIDS …
information security systems. Searching network traffic for a large set of signatures, NIDS …
Signature checking using deterministic finite state machines
D Law, E O'malley, DM O'keeffe, E O'neill - US Patent 8,331,404, 2012 - Google Patents
The general objective of the invention is to reduce the need for post-processing, particularly
by means Software and thereby to enable most if not necessarily all the header and content …
by means Software and thereby to enable most if not necessarily all the header and content …
Detecting at least one predetermined pattern in stream of symbols
An apparatus comprises pattern matching circuitry for detecting instances of at least one
predetermined pattern of symbols within a subject stream of symbols. Encoding circuitry is …
predetermined pattern of symbols within a subject stream of symbols. Encoding circuitry is …