On high-speed flow-based intrusion detection using snort-compatible signatures

F Erlacher, F Dressler - IEEE Transactions on Dependable and …, 2020‏ - ieeexplore.ieee.org
Signature-based Network Intrusion Detection Systems (NIDS) have become state-of-the-art
in modern network security solutions. However, most systems are not designed for modern …

A performance analysis of intrusion detection with snort and security information management

C Thorarensen - 2021‏ - diva-portal.org
Network intrusion detection systems (NIDSs) are a major component in cybersecurity and
can be implemented with open-source software. Active communities and researchers …

High performance intrusion detection using HTTP-based payload aggregation

F Erlacher, F Dressler - 2017 IEEE 42nd Conference on Local …, 2017‏ - ieeexplore.ieee.org
Signature-based Network Intrusion Detection Systems (NIDS) are an integral part of modern
network security solutions. They help to detect and prevent network attacks and intrusions …

Towards a theory for hardware/software codesign

M Voss, TB Ismail, AA Jerraya… - … Workshop on Hardware …, 1994‏ - ieeexplore.ieee.org
This paper aims at a theory for hardware/software codesign. We approach this goal by
investigating system design according to the allocation principle which is a systems …

Machine Learning Based Web Application Plugin for Threat Detection and IP Analysis

K Katulanda, HH Arachchi… - … on Advancements in …, 2023‏ - ieeexplore.ieee.org
Web-based apps are becoming increasingly popular as the internet grows. Since attackers
have focused more on web-based attacks, the security of these apps has become a key …

5G microservice monitoring with Linux kernel

I Oksanen - 2019‏ - aaltodoc.aalto.fi
Software industry is adopting a scalable microservice architecture at increasing pace. At the
advent of 5G, this introduces major changes for the architectures of telecommunication …

[PDF][PDF] Efficient intrusion detection in high-speed networks.

F Erlacher - 2019‏ - digital.ub.uni-paderborn.de
To keep today's computer networks up and running, it is paramount to detect all attacks and
malicious activities contained in the network traffic. This makes network intrusion detection …