Loading...
Please wait, while we are loading the content...
Similar Documents
ABSTRACT ALDWAIRI, MONTHER MUSTAFA. Hardware Efficient Pattern Matching Algorithms and
| Content Provider | CiteSeerX |
|---|---|
| Abstract | Architectures for Fast Intrusion Detection. (Under the direction of Dr. Paul Franzon). Intrusion detection processors are becoming a predominant feature in the field of network hardware. As demand on more network speed increases and new network protocols emerge, network intrusion detection systems are increasing in importance and are being integrated in network processors. Currently, most intrusion detection systems are software running on a general purpose processor. Unfortunately, it is becoming increasingly difficult for software based intrusion detection systems to keep up with increasing network speeds (OC192 and 10Gbps at backbone networks). Signature-based intrusion detection systems monitor network traffic for security threats by scanning packet payloads for attack signatures. Intrusion detection systems have to run at wire speed and need to be configurable to protect against emerging attacks. This dissertation describes the concept, structure and algorithms for a special purpose hardware accelerator designed to meet those demands. We consider the problem of string matching which is the most computationally intensive task in intrusion detection. A configurable string matching accelerator is developed with the focus on increasing throughput while maintaining the |
| File Format | |
| Access Restriction | Open |
| Subject Keyword | Intrusion Detection System Monther Mustafa Hardware Efficient Pattern Matching Algorithm Abstract Aldwairi General Purpose Processor Network Traffic Packet Payload Intensive Task New Network Protocol Emerge Intrusion Detection Network Processor Wire Speed Network Speed Increase Signature-based Intrusion Detection System Paul Franzon Network Hardware Network Speed Network Intrusion Detection System Special Purpose Hardware Accelerator Fast Intrusion Detection Security Threat Backbone Network Predominant Feature Configurable String Attack Signature Intrusion Detection Processor |
| Content Type | Text |
| Resource Type | Thesis |