A survey on encrypted network traffic analysis applications, techniques, and countermeasures

E Papadogiannaki, S Ioannidis - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
The adoption of network traffic encryption is continually growing. Popular applications use
encryption protocols to secure communications and protect the privacy of users. In addition …

In-network machine learning using programmable network devices: A survey

C Zheng, X Hong, D Ding, S Vargaftik… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
Machine learning is widely used to solve networking challenges, ranging from traffic
classification and anomaly detection to network configuration. However, machine learning …

Fast and memory-efficient regular expression matching for deep packet inspection

F Yu, Z Chen, Y Diao, TV Lakshman… - Proceedings of the 2006 …, 2006 - dl.acm.org
Packet content scanning at high speed has become extremely important due to its
applications in network security, network monitoring, HTTP load balancing, etc. In content …

Emerging trends in design and applications of memory-based computing and content-addressable memories

R Karam, R Puri, S Ghosh, S Bhunia - Proceedings of the IEEE, 2015 - ieeexplore.ieee.org
Content-addressable memory (CAM) and associative memory (AM) are types of storage
structures that allow searching by content as opposed to searching by address. Such …

A survey on regular expression matching for deep packet inspection: Applications, algorithms, and hardware platforms

C Xu, S Chen, J Su, SM Yiu… - … Surveys & Tutorials, 2016 - ieeexplore.ieee.org
Deep packet inspection (DPI) is widely used in content-aware network applications such as
network intrusion detection systems, traffic billing, load balancing, and government …

Gnort: High performance network intrusion detection using graphics processors

G Vasiliadis, S Antonatos, M Polychronakis… - Recent Advances in …, 2008 - Springer
The constant increase in link speeds and number of threats poses challenges to network
intrusion detection systems (NIDS), which must cope with higher traffic throughput and …

[BUCH][B] The state of the art in intrusion prevention and detection

ASK Pathan - 2014 - api.taylorfrancis.com
Most of the security threats in various communications networks are posed by the illegitimate
entities that enter or intrude within the network perimeter, which could commonly be termed …

Fast and scalable pattern matching for network intrusion detection systems

S Dharmapurikar, JW Lockwood - IEEE Journal on Selected …, 2006 - ieeexplore.ieee.org
High-speed packet content inspection and filtering devices rely on a fast multipattern
matching algorithm which is used to detect predefined keywords or signatures in the …

Kargus: a highly-scalable software-based intrusion detection system

MA Jamshed, J Lee, S Moon, I Yun, D Kim… - Proceedings of the …, 2012 - dl.acm.org
As high-speed networks are becoming commonplace, it is increasingly challenging to
prevent the attack attempts at the edge of the Internet. While many high-performance …

A malicious network traffic detection model based on bidirectional temporal convolutional network with multi-head self-attention mechanism

S Cai, H Xu, M Liu, Z Chen, G Zhang - Computers & Security, 2024 - Elsevier
The increasingly frequent network intrusions have brought serious impacts to the production
and life, thus malicious network traffic detection has received more and more attention in …