22nd International Conference on Advanced Information Networking and Applications - Workshops (Aina Workshops 2008) 2008
DOI: 10.1109/waina.2008.145
|View full text |Cite
|
Sign up to set email alerts
|

A GPU-Based Multiple-Pattern Matching Algorithm for Network Intrusion Detection Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
27
0

Year Published

2009
2009
2021
2021

Publication Types

Select...
6
3
1

Relationship

0
10

Authors

Journals

citations
Cited by 50 publications
(29 citation statements)
references
References 1 publication
1
27
0
Order By: Relevance
“…Specifically, they search for 16 different patterns in a packet in parallel employing 16 GPU cores. Huang et al [4] do network intrusion detection on a GPU based on the multipattern search algorithm of Wu and Manber [15]. Smith et al [12] use deterministic finite automata and extended deterministic finite automata to do regular expression matching on a GPU for intrusion detection applications.…”
Section: Introductionmentioning
confidence: 99%
“…Specifically, they search for 16 different patterns in a packet in parallel employing 16 GPU cores. Huang et al [4] do network intrusion detection on a GPU based on the multipattern search algorithm of Wu and Manber [15]. Smith et al [12] use deterministic finite automata and extended deterministic finite automata to do regular expression matching on a GPU for intrusion detection applications.…”
Section: Introductionmentioning
confidence: 99%
“…In [6], a GPU parallelised architecture based on the Wu-Manber algorithm is shown. The work in [6] was subsequently improved in [7], where a hierarchical parallel machine architecture on GPU was used to address some of the shortcomings revealed in [6], mainly the problem of state explosion that appears when it is necessary to search for complex regular expressions.…”
Section: Gpusmentioning
confidence: 99%
“…Many attempts have been made to use graphics processors for security applications, including cryptography [11,8], data carving [17], and intrusion detection [14,30,10,27,13]. In our previous work [30], we extended Snort to offload the string matching operations of the Snort IDS to the GPU, offering a three times speedup to the processing throughput compared to a CPU-only implementation.…”
Section: Related Workmentioning
confidence: 99%