Proceedings of the 6th ACM/IEEE Symposium on Architectures for Networking and Communications Systems 2010
DOI: 10.1145/1872007.1872032
|View full text |Cite
|
Sign up to set email alerts
|

Range hash for regular expression pre-filtering

Abstract: Recently, major Internet carriers and vendors successfully tested high-speed backbone networks at 100-Gbps line speed to support rapid growth of the Internet traffic demands. In addition, traffic is getting more concentrated to points such as data centers, and demand for protecting such high-speed networks from attack traffic is increasing. Deep Packet Inspection (DPI) with Regular Expression (RegEx) detection is the de facto defense mechanism agains network intrusions. However, current RegEx detection systems… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2011
2011
2021
2021

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(3 citation statements)
references
References 41 publications
0
3
0
Order By: Relevance
“…Some designs focus on plaintext signatures which allow for the use of hash tables for match verification [22,23]. Taking a similar pipeline approach but targeting regex, Bando [24] tackles the issues of effectively filtering regex signatures with low specificity but does not detail a solution for verifying filtered packets once identified.…”
Section: Related Workmentioning
confidence: 99%
“…Some designs focus on plaintext signatures which allow for the use of hash tables for match verification [22,23]. Taking a similar pipeline approach but targeting regex, Bando [24] tackles the issues of effectively filtering regex signatures with low specificity but does not detail a solution for verifying filtered packets once identified.…”
Section: Related Workmentioning
confidence: 99%
“…Another approach for IDS implementation in FPGA is the Finite State Machine (FSM) paradigm [19,20], which has different pros and cons with the Bloom Filter approach [21]. Additionally, in [22], an FPGA implementation of a Deep Packet Inspection architecture with Regular Expression Detection is shown. In [23], a parallel pattern matching architecture based on a compact reconfigurable filter and a coprocessor for FPGA is presented.…”
Section: Fpgas/asicsmentioning
confidence: 99%
“…Akamai, the biggest content provider handling around 20% of the total Internet traffic using 61,000 servers deployed worldwide, reports only less than 300 attacks in 24hours in average and so most of the traffic is legitimated. So, if we can filter out these benign packets and leave little suspicious packets for further precise verification, IDS with a throughput much less than the line rate can keep up with the traffic [10].…”
Section: Introductionmentioning
confidence: 99%