A system architecture for high-speed deep packet inspection in signature-based network intrusion prevention
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kim, Sunil | - |
dc.contributor.author | Lee, Jun-yong | - |
dc.date.accessioned | 2022-01-14T07:42:51Z | - |
dc.date.available | 2022-01-14T07:42:51Z | - |
dc.date.created | 2022-01-14 | - |
dc.date.issued | 2007-05 | - |
dc.identifier.issn | 1383-7621 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/hongik/handle/2020.sw.hongik/23596 | - |
dc.description.abstract | Pattern matching is one of critical parts of Network Intrusion Prevention Systems (NIPS). Pattern matching hardware for NIPS should find a matching pattern at wire speed. However, that alone is not good enough. First, pattern matching hardware should be able to generate sufficient pattern match information including the pattern index number and the location of the match found at wire speed. Second, it should support pattern grouping to reduce unnecessary pattern matches. Third, it should guarantee worst-case performance even if the number of patterns is increased. Finally it should be able to update patterns in a few minutes or seconds without stopping its operations. We propose a system architecture to meet the above requirements. Using Xilinx FPGA simulation, we show that the new system scales well to achieve a high speed over 10 Gbps and satisfies all of the above requirements. (c) 2006 Elsevier B.V. All rights reserved. | - |
dc.language | 영어 | - |
dc.language.iso | en | - |
dc.publisher | ELSEVIER | - |
dc.title | A system architecture for high-speed deep packet inspection in signature-based network intrusion prevention | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Kim, Sunil | - |
dc.contributor.affiliatedAuthor | Lee, Jun-yong | - |
dc.identifier.doi | 10.1016/j.sysarc.2006.10.005 | - |
dc.identifier.scopusid | 2-s2.0-33947280484 | - |
dc.identifier.wosid | 000245793600007 | - |
dc.identifier.bibliographicCitation | JOURNAL OF SYSTEMS ARCHITECTURE, v.53, no.5-6, pp.310 - 320 | - |
dc.relation.isPartOf | JOURNAL OF SYSTEMS ARCHITECTURE | - |
dc.citation.title | JOURNAL OF SYSTEMS ARCHITECTURE | - |
dc.citation.volume | 53 | - |
dc.citation.number | 5-6 | - |
dc.citation.startPage | 310 | - |
dc.citation.endPage | 320 | - |
dc.type.rims | ART | - |
dc.type.docType | Article; Proceedings Paper | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Hardware & Architecture | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Software Engineering | - |
dc.subject.keywordAuthor | network intrusion prevention | - |
dc.subject.keywordAuthor | pattern matching | - |
dc.subject.keywordAuthor | embedded system architecture | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
94, Wausan-ro, Mapo-gu, Seoul, 04066, Korea02-320-1314
COPYRIGHT 2020 HONGIK UNIVERSITY. ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.