Proceedings of the 2007 ACM Symposium on Applied Computing 2007
DOI: 10.1145/1244002.1244068
|View full text |Cite
|
Sign up to set email alerts
|

Memory-efficient content filtering hardware for high-speed intrusion detection systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2008
2008
2014
2014

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(6 citation statements)
references
References 10 publications
0
6
0
Order By: Relevance
“…The work presented by [10] proposed a hash implementation of a bottom-up tree, aiming the increase of performance and reduction of memory consumption for storing patterns of 2,770 signatures present in the Snort rule database. By using this method, it was possible to reduce the space occupied by the signatures of about 512 kB to 350 kB, which represents a saving of about 32%.…”
Section: Related Workmentioning
confidence: 99%
“…The work presented by [10] proposed a hash implementation of a bottom-up tree, aiming the increase of performance and reduction of memory consumption for storing patterns of 2,770 signatures present in the Snort rule database. By using this method, it was possible to reduce the space occupied by the signatures of about 512 kB to 350 kB, which represents a saving of about 32%.…”
Section: Related Workmentioning
confidence: 99%
“…Compromise of protected code via rootkits [22] represents one of the most prevalent exploits. Recent work has begun exploring different hardware based approaches to security [5,6,12] with many people coming to believe that we cannot solely use software to protect software and only hardware, coupled with software, can do that job successfully [1,2,3,4,5,6,7,8,9,10,11,12,13]. Though a number of advantages to hardware over software have been suggested, we found no research discussing what precisely makes hardware a significant improvement over software and just what capabilities hardware provides that software cannot.…”
Section: Why Hardware?mentioning
confidence: 99%
“…Mott presents a number of hardware primitives that can be leveraged in [5]. The two main areas of interest for creating hardware security (and security in general) have been attempts to monitor processes running on the production system, mainly through various memory introspection techniques [1,2,3], and monitoring the incoming network traffic as it enters the system [8,9,10,11,12,13]. …”
Section: Hardware Primitivesmentioning
confidence: 99%
See 1 more Smart Citation
“…However, TCAMs are expensive, power-hungry, and not scalable with respect to clock rate or circuit area [9], [10]. FPGA technologies have become an attractive option for implementing real-time network processing engines [11], [12], [13]. State-ofthe-art FPGA devices provide dense logic units, large amounts of on-chip memory and high-bandwidth interfaces for various external memory technologies [14].…”
Section: Introductionmentioning
confidence: 99%