Implementation of deep packet inspection in smart grids and industrial Internet of Things: Challenges and opportunities

GDLT Parra, P Rad, KKR Choo - Journal of Network and Computer …, 2019 - Elsevier
Upgrading a power grid to a smart grid is a challenging task. For example, since power grids
were originally developed to support unidirectional communications, the migration process …

A survey on regular expression matching for deep packet inspection: Applications, algorithms, and hardware platforms

C Xu, S Chen, J Su, SM Yiu… - … Surveys & Tutorials, 2016 - ieeexplore.ieee.org
Deep packet inspection (DPI) is widely used in content-aware network applications such as
network intrusion detection systems, traffic billing, load balancing, and government …

Efficient application identification with network devices

Q Ma, B Burns, R Oliveira - US Patent App. 12/361,364, 2010 - Google Patents
BACKGROUND [0002] A computer netWork is a collection of intercon nected computing
devices that exchange data and share resources. In a packet-based network, such as the …

A survey on data leakage prevention systems

S Alneyadi, E Sithirasenan… - Journal of Network and …, 2016 - Elsevier
Protection of confidential data from being leaked to the public is a growing concern among
organisations and individuals. Traditionally, confidentiality of data has been preserved using …

Algorithms to accelerate multiple regular expressions matching for deep packet inspection

S Kumar, S Dharmapurikar, F Yu, P Crowley… - ACM SIGCOMM …, 2006 - dl.acm.org
There is a growing demand for network devices capable of examining the content of data
packets in order to improve network security and provide application-specific services. Most …

Efficient pattern matching over event streams

J Agrawal, Y Diao, D Gyllstrom… - Proceedings of the 2008 …, 2008 - dl.acm.org
Pattern matching over event streams is increasingly being employed in many areas
including financial services, RFIDbased inventory management, click stream analysis, and …

Learning and detecting activities from movement trajectories using the hierarchical hidden Markov model

NT Nguyen, DQ Phung, S Venkatesh… - 2005 IEEE Computer …, 2005 - ieeexplore.ieee.org
Directly modeling the inherent hierarchy and shared structures of human behaviors, we
present an application of the hierarchical hidden Markov model (HHMM) for the problem of …

Matching with a large vulnerability signature ruleset for high performance network defense

Y Chen, LI Zhichun, G **a, B Liu - US Patent 8,522,348, 2013 - Google Patents
BACKGROUND Computers and software running on computers include Vulnerabilities that
are often exploited by computer hackers as well as by malicious programmers seeking to …

Deep packet inspection as a service

A Bremler-Barr, Y Harchol, D Hay, Y Koral - Proceedings of the 10th …, 2014 - dl.acm.org
Middleboxes play a major role in contemporary networks, as forwarding packets is often not
enough to meet operator demands, and other functionalities (such as security, QoS/QoE …

Survey of performance acceleration techniques for network function virtualization

L Linguaglossa, S Lange, S Pontarelli… - Proceedings of the …, 2019 - ieeexplore.ieee.org
The ongoing network softwarization trend holds the promise to revolutionize network
infrastructures by making them more flexible, reconfigurable, portable, and more adaptive …