2023
DOI: 10.13052/jcsm2245-1439.123.5
|View full text |Cite
|
Sign up to set email alerts
|

Tools for Analyzing Signature-Based Hardware Solutions for Cyber Security Systems

Abstract: When creating signature-based cybersecurity systems for network intrusion detection (NIDS), spam filtering, protection against viruses, worms, etc., developers have to use hardware devices such as field programmable gate arrays (FPGA), since software solutions can no longer support the necessary speeds. There are many different approaches to build hardware circuits for pattern matching (where patterns are the parts of signatures). Choosing the optimal technical solution for certain conditions is not a trivial … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(3 citation statements)
references
References 21 publications
0
3
0
Order By: Relevance
“…It serves as a meta-heuristic method designed for solving optimization problems. Figure 6 provides an illustration of a Siberian tiger [17].…”
Section: Feature Selectionmentioning
confidence: 99%
See 2 more Smart Citations
“…It serves as a meta-heuristic method designed for solving optimization problems. Figure 6 provides an illustration of a Siberian tiger [17].…”
Section: Feature Selectionmentioning
confidence: 99%
“…The STO algorithm is employed to optimize the 1D CNN parameters. Equations ( 16), (17), and ( 18) are utilized to model the 1D component of CNN [53]. In these equations, x represents a one-dimensional input with n components.…”
Section: Neural Network Modelingmentioning
confidence: 99%
See 1 more Smart Citation