|
[1] M. Fisk and G. Varghese, “Applying Fast String Matching to Intrusion Detection,” Technical Report In Preparation, Successor to UCSD TR CS2001-0670, University of California, San Diego, 2002. [2] Intel® IXP4XX product line of network processors, http:// www.intel.com/p/en_US/embedded/hwsw/hardware/ixp-4xx. [3] Snort, www.snort.org. [4] R.S. Boyer and J.S. Moore, “A fast string searching algorithm,” Communications of the ACM, 20(10), pp. 762 - 772, 1977. [5] A.V. Aho and M.J. Corasick, “Efficient string matching: an aid to bibliographic search,” Communications of the ACM, 18(6), pp. 333- 340, 1975. [6] N. Tuck, T. Sherwood, B. Calder, and G. Varghese, “Deterministic memory-efficient string matching algorithms for intrusion detection,” IEEE INFOCOM, pp. 2628-2639, 2004. [7] S. Wu and U. Manber, “A fast algorithm for multi-pattern searching,” Technical Report TR-94-17, Department of Computer Science, University of Arizona, 1994. [8] T.F. Sheu, N.F. Huang and H.P. Lee, “Hierarchical multi-pattern matching algorithm for network content inspection,” Information Sciences, 178(14), pp. 2880-2898, 2008. [9] Y. Hilewitz and R.B. Lee, “Fast bit gather, bit scatter and bit permutation instructions for commodity microprocessors,” Journal of Signal Processing Systems, 53(1-2), pp. 145-169, 2008. [10] R.N. Horspool, “Practical fast searching in strings,” Software Practice and Experience, 10(6), pp. 501-506, 1980. [11] B. Xu, X. Zhou, J. Li, “Recursive shift indexing: A fast multi-pattern string matching algorithm,” International Conference on Applied Cryptography and Network Security, 2006. [12] R.T. Liu, N.F. Huang, C.H. Chen and C.N. Kao, “A fast string matching algorithm for network processor-based intrusion detection system,” ACM Transactions in Embedded Computing Systems, 3(3), pp. 614-633, 2004. [13] C.J. Coit, S. Staniford and J. McAlerney, “Towards faster string matching for intrusion detection or exceeding the speed of snort,” DARPA Information Survivability Conference and Exposition, pp. 367-371, 2001.
|