2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications 2013
DOI: 10.1109/trustcom.2013.138
|View full text |Cite
|
Sign up to set email alerts
|

Performance Optimization of Aho-Corasick Algorithm on a GPU

Abstract: Aho-Corasick (AC) algorithm is a multiple patterns matching algorithm commonly used for applications such as computer and network security, bioinformatics, image processing, among others. These applications are computationally demanding, thus optimizing performance for AC algorithm is crucial. In this paper, we present a performance optimization strategy for the AC algorithm on a Graphic Processing Unit (GPU). Our strategy efficiently utilizes the high degree of the onchip parallelism and the complicated memor… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 10 publications
(7 citation statements)
references
References 12 publications
0
7
0
Order By: Relevance
“…Besides the DFA partitioning based parallelization approach described above, we apply further performance optimization techniques to our GPU implementation. They are mostly taken from our earlier work [15].…”
Section: Further Performance Optimizationsmentioning
confidence: 99%
See 3 more Smart Citations
“…Besides the DFA partitioning based parallelization approach described above, we apply further performance optimization techniques to our GPU implementation. They are mostly taken from our earlier work [15].…”
Section: Further Performance Optimizationsmentioning
confidence: 99%
“…While loading a data block, we let multiple threads generate memory access which fall within the 128-bytes range so that these access get combined into one request and sent to the memory [10]. This saves the memory bandwidth a lot and improves the performance [15].…”
Section: Further Performance Optimizationsmentioning
confidence: 99%
See 2 more Smart Citations
“…To identify the existence of malicious signatures in the packet payload, various pattern-matching algorithms were used. Pattern matching is a computationally intensive task that accounts for up to 75% of the execution time of IDSs [6]. There is no dependency between instructions in signature matching.…”
Section: Figurementioning
confidence: 99%