Implementation of deep packet inspection in smart grids and industrial Internet of Things: Challenges and opportunities
Upgrading a power grid to a smart grid is a challenging task. For example, since power grids
were originally developed to support unidirectional communications, the migration process …
were originally developed to support unidirectional communications, the migration process …
A survey on regular expression matching for deep packet inspection: Applications, algorithms, and hardware platforms
Deep packet inspection (DPI) is widely used in content-aware network applications such as
network intrusion detection systems, traffic billing, load balancing, and government …
network intrusion detection systems, traffic billing, load balancing, and government …
Efficient application identification with network devices
Q Ma, B Burns, R Oliveira - US Patent App. 12/361,364, 2010 - Google Patents
BACKGROUND [0002] A computer netWork is a collection of intercon nected computing
devices that exchange data and share resources. In a packet-based network, such as the …
devices that exchange data and share resources. In a packet-based network, such as the …
A survey on data leakage prevention systems
S Alneyadi, E Sithirasenan… - Journal of Network and …, 2016 - Elsevier
Protection of confidential data from being leaked to the public is a growing concern among
organisations and individuals. Traditionally, confidentiality of data has been preserved using …
organisations and individuals. Traditionally, confidentiality of data has been preserved using …
Algorithms to accelerate multiple regular expressions matching for deep packet inspection
S Kumar, S Dharmapurikar, F Yu, P Crowley… - ACM SIGCOMM …, 2006 - dl.acm.org
There is a growing demand for network devices capable of examining the content of data
packets in order to improve network security and provide application-specific services. Most …
packets in order to improve network security and provide application-specific services. Most …
Efficient pattern matching over event streams
Pattern matching over event streams is increasingly being employed in many areas
including financial services, RFIDbased inventory management, click stream analysis, and …
including financial services, RFIDbased inventory management, click stream analysis, and …
Learning and detecting activities from movement trajectories using the hierarchical hidden Markov model
Directly modeling the inherent hierarchy and shared structures of human behaviors, we
present an application of the hierarchical hidden Markov model (HHMM) for the problem of …
present an application of the hierarchical hidden Markov model (HHMM) for the problem of …
Matching with a large vulnerability signature ruleset for high performance network defense
Y Chen, LI Zhichun, G **a, B Liu - US Patent 8,522,348, 2013 - Google Patents
BACKGROUND Computers and software running on computers include Vulnerabilities that
are often exploited by computer hackers as well as by malicious programmers seeking to …
are often exploited by computer hackers as well as by malicious programmers seeking to …
Deep packet inspection as a service
Middleboxes play a major role in contemporary networks, as forwarding packets is often not
enough to meet operator demands, and other functionalities (such as security, QoS/QoE …
enough to meet operator demands, and other functionalities (such as security, QoS/QoE …
Survey of performance acceleration techniques for network function virtualization
The ongoing network softwarization trend holds the promise to revolutionize network
infrastructures by making them more flexible, reconfigurable, portable, and more adaptive …
infrastructures by making them more flexible, reconfigurable, portable, and more adaptive …