Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model

S Aljawarneh, M Aldwairi, MB Yassein - Journal of Computational Science, 2018 - Elsevier
Efficiently detecting network intrusions requires the gathering of sensitive information. This
means that one has to collect large amounts of network transactions including high details of …

Accelerated deep neural networks for enhanced intrusion detection system

S Potluri, C Diedrich - 2016 IEEE 21st international conference …, 2016 - ieeexplore.ieee.org
Network based communication is more vulnerable to outsider and insider attacks in recent
days due to its wide spread applications in many fields. Intrusion Detection System (IDS) a …

Towards blockchain-enabled single character frequency-based exclusive signature matching in IoT-assisted smart cities

W Meng, W Li, S Tug, J Tan - Journal of parallel and distributed computing, 2020 - Elsevier
With the increasing viability of Internet of Things (IoT), more devices are expected to be
connected in a smart city environment. It can provide many benefits for people's daily life, but …

Variable-stride multi-pattern matching for scalable deep packet inspection

N Hua, H Song, TV Lakshman - IEEE INFOCOM 2009, 2009 - ieeexplore.ieee.org
Accelerating multi-pattern matching is a critical issue in building high-performance deep
packet inspection systems. Achieving high-throughputs while reducing both memory-usage …

A memory efficient multiple pattern matching architecture for network security

T Song, W Zhang, D Wang… - IEEE INFOCOM 2008-The …, 2008 - ieeexplore.ieee.org
Pattern matching is one of the most important components for the content inspection based
applications of network security, and it requires well designed algorithms and architectures …

A memory-efficient pipelined implementation of the aho-corasick string-matching algorithm

D Pao, W Lin, B Liu - ACM Transactions on Architecture and Code …, 2010 - dl.acm.org
With rapid advancement in Internet technology and usages, some emerging applications in
data communications and network security require matching of huge volume of data against …

[HTML][HTML] A novel privacy preserving user identification approach for network traffic

N Clarke, F Li, S Furnell - computers & security, 2017 - Elsevier
The prevalence of the Internet and cloud-based applications, alongside the technological
evolution of smartphones, tablets and smartwatches, has resulted in users relying upon …

A Concise Review of FPGA-Based Hardware Solutions for Network Intrusion Detection

S Hilgurt - 2021 IEEE 8th International Conference on …, 2021 - ieeexplore.ieee.org
A Network Intrusion Detection System (NIDS) is an important part of the state-of-the-art
information security systems. Searching network traffic for a large set of signatures, NIDS …

Signature checking using deterministic finite state machines

D Law, E O'malley, DM O'keeffe, E O'neill - US Patent 8,331,404, 2012 - Google Patents
The general objective of the invention is to reduce the need for post-processing, particularly
by means Software and thereby to enable most if not necessarily all the header and content …

Detecting at least one predetermined pattern in stream of symbols

M Cafarella, V Gogte, T Wenisch - US Patent 10,339,141, 2019 - Google Patents
An apparatus comprises pattern matching circuitry for detecting instances of at least one
predetermined pattern of symbols within a subject stream of symbols. Encoding circuitry is …