System security is a prerequisite for efficient day-to-day transactions. As a consequence, Intrusion Detection Systems (IDS) are commonly used to provide an effective security ring to systems in a network. An IDS operates by inspecting packets flowing in the network for malicious content. To do so, an IDS like Snort compares bytes in a packet with a database of prior reported attacks. This fun...
Paperback: 160 pages
Publisher: LAP LAMBERT Academic Publishing (October 13, 2014)
Product Dimensions: 5.9 x 0.4 x 8.7 inches
Amazon Rank: 14241266
Format: PDF ePub fb2 djvu book
- Govind Sreekar Shenoy pdf
- Govind Sreekar Shenoy ebooks
- 3659612774 pdf
- Computers and Technology epub books
- 978-3659612770 epub
What i eat around the world in 80 diets Download Becoming richard pryor pdf at contmoshijohn.wordpress.com Download Trombone notes or star wars pdf at cninhaido.wordpress.com Read Road dawgz urban books ebook badmenegaan.wordpress.com
can also be viewed as string matching of the packet bytes with the attack string database. In this thesis we explore hardware and software techniques to accelerate string matching in an IDS. We propose mechanisms/hueristics that can be deployed either in a custom ASIC or a network processor and/or a commodity CPU. Our performance results indicate clear benefits in using our proposed scheme over the state-of-the-art.