System security is a prerequisite for efficient day-to-day transactions. As a consequence, Intrusion Detection Systems (IDS) are commonly used to provide an effective security ring to systems in a network. An IDS operates by inspecting packets flowing in the network for malicious content. To do so, an IDS like Snort compares bytes in a packet with a database of prior reported attacks. This fun...
Paperback: 160 pages
Publisher: LAP LAMBERT Academic Publishing (October 13, 2014)
Product Dimensions: 5.9 x 0.4 x 8.7 inches
Amazon Rank: 14241266
Format: PDF ePub fb2 djvu book
- Govind Sreekar Shenoy pdf
- Govind Sreekar Shenoy ebooks
- 3659612774 pdf
- Computers and Technology epub books
- 978-3659612770 epub
Download Santa is coming to maryland pdf at allliajikijeo.wordpress.com Read Reminiscences of a stock operator ebook dinskanalift.wordpress.com Toys amazing stories behind some great inventions Here Love your inner goess oracle cars pdf link
can also be viewed as string matching of the packet bytes with the attack string database. In this thesis we explore hardware and software techniques to accelerate string matching in an IDS. We propose mechanisms/hueristics that can be deployed either in a custom ASIC or a network processor and/or a commodity CPU. Our performance results indicate clear benefits in using our proposed scheme over the state-of-the-art.