2005
DOI: 10.1109/tvlsi.2005.859472
|View full text |Cite
|
Sign up to set email alerts
|

A computationally efficient engine for flexible intrusion detection

Abstract: Pattern matching for network security and intrusion detection demands exceptionally high performance. This paper describes a novel systolic array-based string matching architecture using a buffered, two-comparator variation of the Knuth-Morris-Pratt (KMP) algorithm. The architecture compares favorably with the state-of-the-art hardwired designs while providing on-the-fly reconfiguration, efficient hardware utilization, and high clock rates. KMP is a well-known, computationally-efficient string matching techniq… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
13
0

Year Published

2007
2007
2017
2017

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 16 publications
(13 citation statements)
references
References 19 publications
0
13
0
Order By: Relevance
“…Our algorithm is to assist the clinicians to make a final decision. In our implementation, we first set the keywords corresponding to various specific lesions, such as Gastric Cancer, Esophageal Cancer, and Esophagitis, and then, the weak label of each endoscopic image folder is mined from the text of the endoscopic medical report based on a text matching method, i.e., Knuth-Morris-Pratt [50]. If the diagnostic text does not match any of the keywords, the corresponding label of the endoscopic image folder is annotated as negative; otherwise, the label of the endoscopic image folder is annotated as positive.…”
Section: Overview Of Our Methodsmentioning
confidence: 99%
“…Our algorithm is to assist the clinicians to make a final decision. In our implementation, we first set the keywords corresponding to various specific lesions, such as Gastric Cancer, Esophageal Cancer, and Esophagitis, and then, the weak label of each endoscopic image folder is mined from the text of the endoscopic medical report based on a text matching method, i.e., Knuth-Morris-Pratt [50]. If the diagnostic text does not match any of the keywords, the corresponding label of the endoscopic image folder is annotated as negative; otherwise, the label of the endoscopic image folder is annotated as positive.…”
Section: Overview Of Our Methodsmentioning
confidence: 99%
“…As in Wang et al [2016], we first set the keywords corresponding to various specific lesions, such as Gastric Cancer and Esophageal Cancer. Then we match the keywords with the corresponding text record based on a textmatching algorithm, that is, Knuth-Morris-Pratt [Baker and Prasanna 2005]. If the text record does not match any of the keywords, then the corresponding label of the EEMR is annotated as normal; otherwise, the label of the EEMR is annotated as the lesion related to the matched keyword.…”
Section: Label Miningmentioning
confidence: 99%
“…If the number of possible configurations is small, then static verification is sufficient, but if the space of possible cores is infinite, then dynamic verification is necessary. For example, Baker et al have developed an intrusion detection system based on reconfigurable hardware that dynamically swaps the detection cores [2] [1]. Since the space of intrusion detection rule sets is infinite, the space of detection cores is also infinite.…”
Section: Effective Scrubbing and Reuse Of Reconfigurable Hardwarementioning
confidence: 99%
“…To protect the key in external memory, we need to implement a memory protection module, we need to ensure that each and every memory access goes through this monitor, and we need to ensure that all cores are communicating only through their specified interfaces. To ensure these properties hold at even the lowest levels of implementation (after all the design tools have finished their transformations), we argue that slight modifications in the design methods and tools can enable the rapid static verification of finished FPGA bitstreams 2 . The techniques presented in this paper are steps towards a cohesive reconfigurable system design methodology that explicitly supports cores with varying levels of trust and criticality -all sharing a single physical device.…”
Section: Introductionmentioning
confidence: 99%