Gnort: High Performance Network Intrusion Detection Using Graphics Processors
Top Cited Papers
- 17 September 2008
- book chapter
- conference paper
- Published by Springer Science and Business Media LLC in Lecture Notes in Computer Science
Abstract
No abstract availableKeywords
This publication has 25 references indexed in Scilit:
- Towards Software-Based Signature Detection for Intrusion Prevention on the Network CardLecture Notes in Computer Science, 2006
- A Framework for Rule Processing in Reconfigurable Network SystemsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2005
- CryptoGraphics: Secret Key Cryptography Using Graphics CardsLecture Notes in Computer Science, 2005
- Time and area efficient pattern matching on FPGAsPublished by Association for Computing Machinery (ACM) ,2004
- Generating realistic workloads for network intrusion detection systemsACM SIGSOFT Software Engineering Notes, 2004
- On the statistical distribution of processing times in network intrusion detectionPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2004
- Towards faster string matching for intrusion detection or exceeding the speed of SnortPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- A string matching algorithm fast on the averageLecture Notes in Computer Science, 1979
- A fast string searching algorithmCommunications of the ACM, 1977
- Efficient string matchingCommunications of the ACM, 1975