|
[1] M. Fisk and G. Varghese, “Applying Fast String Matching to In- trusion Detection,”Tech. R. TR CS2001-0670, University of Cali- fornia, San Diego, 2002. [2] J. B. Cabrera, J. Gosar, W. Lee, and R. K. Mehra,“On the Statistical DistributionofProcessingTimesinNetworkIntrusionDetection,”in Proc. IEEE Conference on Decision and Control, vol. 1, pp. 75-80, 2004. [3] M.Roesch,“Snort–LightweightIntrusionDetectionforNetworks,” in Proc. the 13 th Systems Administration Conference, pp. 229-238, 1999. [4] T. Sato and M. Fukase,“Reconfigurable Hardware Implementation of Host-base IDS,”in Proc. the 13 th Systems Administration Con- ference, pp. 849-853, 2003. [5] A.V.AhoandM.J.Corasick,“EfficientStringMatching: AnAidto Bibliographic Search,”Commun. ACM, vol. 18, no6, pp. 333-340, 1975. [6] V. Chandola, A. Banerjee, and V. Kumar, “Anomaly Detection: A Survey,”ACM Computing Surveys, 2009. [7] D. L. Schff, Y.R. Choe, and V. S. Pai ,“Conservative vs. Optimistic Parallelization of Stateful Network Intrusion Detection in Commod- ity Hardware,”in Proc. the 12 th ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming, 2007. [8] M.Vallentin, R.Sommer,JLee, C.Leres, V.Paxson, andB.Tierney, “The NIDS C: Scalable, Stateful Network Intrusion Detection on Commodity Hardware,”in Proc. the 10 th International Symposium on Recent Advance in Intrusion Detection, 2007. [9] G. Vasiliadis, M. Polychronakis, and S. Ioannidis, “MIDeA: A Multi-Parallel Intrusion Detection Architecture,”in Proc. the 18 th ACM Conference on Computer and Communication Security(CCS), pp.297-308, 2011. [10] N.P.Tran,M.Lee,andD.H.Choi, “CacheLocality-CentricParallel String Matching on Many-Core Accelerator Chips,”Sci. Program. 2015, pp.1-20, 2015. [11] N. Cascarano, P.Rolandio, F. Risso, and R. Sisto, “iNF Ant: NFA Pattern Matching on GPGPU Device,”in Proc. the ACM SIG- COMM, pp. 21-26, 2010. [12] G.Vasiliadis, S.Antonatos, M.Polychronakis, E.P.Markatos, andS. Iasnnidis,“Gnort: High Performance Network Intrusion Detection UsingGraphicsProcessors,”in Proc.11thInternationalSymposium on Recent Advances in Intrusion Detection (RAID), 2008. [13] C. Wu, J. Yin, Z.Cai, E. Zhu, and J. Chen,“A Hybrid Parallel Sig- nature Matching Model for Network Security Applications Using SIMD GPU,”in Proc. the 8th APPT, pp.192-204, 2009. [14] Z. K. Baker and V. K. Prasanna, “Time and Area Efficient Pattern Matching on FPGAs,”in Proc. 12th ACM/SIGDA International Symposium on Field Programmable Gate Arrays, 2004. [15] J. H. Knuth, J. H. Morris, V. R. Pratt, “Fast Pattern Matching in Strings,”SIAM J. Comput., vol. 6, no. 2, pp.127–146, 1977. [16] R. S. Boyer, J. S. Moore, “A Fast String Searching Algorithm,” Commun. ACM, vol. 20, no. 10, pp.762–772, 1977. [17] S. Wu, U. Manber,“A Fast Algorithm for Multi-pattern Searching,” Tech. R. TR-94-17, Department of Computer Science, University of Arizona, 1994. [18] T. F. Sheua , N. F. Huang and H.P. Lee,“Hierarchical Multi-pattern Matching Algorithm for Network Content Inspection,”Information Sciences, pp. 2880-2898, 2008. [19] Microsoft Corporation,“Scalable Networking: Eliminating the Re- ceive Processing Bottleneck - Introducing RSS,”2005. [20] Receive side scaling on Intel Network Adapters. [Online]. Avail- able:http://www.intel.com/support/network/adapter/pro100/sb/cs- 027574.htm [21] L. Deri., “Improving Passive Packet Capture: Beyond Device Polling,”in Proc. 4 th International System Administration and Net- work Engineering Conference (SANE), 2004. [22] S. Han, K. Jang, K. Park and S. Moon, “PacketShader: a GPU- Accelerated Software Router,”in Proc. ACM SIGCOMM, 2010. [23] Snort2923. [Online]. Available:https://www.snort.org/downloads/ archive/snort/snort-2.9.2.3.tar.gz
|