{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T22:49:14Z","timestamp":1775602154373,"version":"3.50.1"},"publisher-location":"Cham","reference-count":36,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031371196","type":"print"},{"value":"9783031371202","type":"electronic"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-37120-2_6","type":"book-chapter","created":{"date-parts":[[2023,6,28]],"date-time":"2023-06-28T23:04:56Z","timestamp":1687993496000},"page":"83-98","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["FPGA-Enabled Efficient Framework for\u00a0High-Performance Intrusion Prevention Systems"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2917-1244","authenticated-orcid":false,"given":"Cuong","family":"Pham-Quoc","sequence":"first","affiliation":[]},{"given":"Tran Ngoc","family":"Thinh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,6,29]]},"reference":[{"issue":"3","key":"6_CR1","doi-asserted-by":"publisher","first-page":"322","DOI":"10.3390\/electronics8030322","volume":"8","author":"R Abdulhammed","year":"2019","unstructured":"Abdulhammed, R., Musafer, H., Alessa, A., Faezipour, M., Abuzneid, A.: Features dimensionality reduction approaches for machine learning based network intrusion detection. Electronics 8(3), 322 (2019)","journal-title":"Electronics"},{"key":"6_CR2","doi-asserted-by":"publisher","unstructured":"Ahmad, Z., Shahid Khan, A., Wai Shiang, C., Abdullah, J., Ahmad, F.: Network intrusion detection system: a systematic study of machine learning and deep learning approaches. Trans. Emerg. Telecommun. Technol. (ETT) 32(1), e4150 (2021). https:\/\/doi.org\/10.1002\/ett.4150. https:\/\/onlinelibrary.wiley.com\/doi\/abs\/10.1002\/ett.4150","DOI":"10.1002\/ett.4150"},{"key":"6_CR3","doi-asserted-by":"publisher","unstructured":"Ahmed, M., Naser Mahmood, A., Hu, J.: A survey of network anomaly detection techniques. J. Netw. Comput. Appl. 60, 19\u201331 (2016). https:\/\/doi.org\/10.1016\/j.jnca.2015.11.016. https:\/\/www.sciencedirect.com\/science\/article\/pii\/S1084804515002891","DOI":"10.1016\/j.jnca.2015.11.016"},{"key":"6_CR4","unstructured":"AMD Xilinx: Vivado overview (2023). https:\/\/www.xilinx.com\/products\/design-tools\/vivado.html. Accessed 01 Apr 2023"},{"key":"6_CR5","unstructured":"Antichi, G.: OSNT - the open source network tester (2023). https:\/\/osnt.org. Accessed 01 Apr 2023"},{"key":"6_CR6","doi-asserted-by":"crossref","unstructured":"Ce\u0161ka, M., et al.: Deep packet inspection in FPGAs via approximate nondeterministic automata. In: 2019 IEEE 27th Annual International Symposium on Field-Programmable Custom Computing Machines (FCCM), pp. 109\u2013117. IEEE (2019)","DOI":"10.1109\/FCCM.2019.00025"},{"issue":"5","key":"6_CR7","doi-asserted-by":"publisher","first-page":"523","DOI":"10.1007\/s10009-019-00520-8","volume":"22","author":"M \u010ce\u0161ka","year":"2020","unstructured":"\u010ce\u0161ka, M., Havlena, V., Hol\u00edk, L., Leng\u00e1l, O., Vojnar, T.: Approximate reduction of finite automata for high-speed network intrusion detection. Int. J. Softw. Tools Technol. Transfer 22(5), 523\u2013539 (2020)","journal-title":"Int. J. Softw. Tools Technol. Transfer"},{"key":"6_CR8","doi-asserted-by":"publisher","unstructured":"Cong, J., et al.: FPGA HLS today: successes, challenges, and opportunities. ACM Trans. Reconfigurable Technol. Syst. 15(4) (2022). https:\/\/doi.org\/10.1145\/3530775","DOI":"10.1145\/3530775"},{"key":"6_CR9","unstructured":"Digilent an NI companay: NetFPGA-SUME virtex-7 FPGA development board (2023). https:\/\/digilent.com\/shop\/netfpga-sume-virtex-7-fpga-development-board\/. Accessed 01 Apr 2023"},{"key":"6_CR10","unstructured":"Dua, D., Graff, C.: UCI machine learning repository (2017). http:\/\/archive.ics.uci.edu\/ml. Accessed 01 Apr 2023"},{"issue":"1\u20132","key":"6_CR11","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1016\/j.cose.2008.08.003","volume":"28","author":"P Garcia-Teodoro","year":"2009","unstructured":"Garcia-Teodoro, P., Diaz-Verdejo, J., Maci\u00e1-Fern\u00e1ndez, G., V\u00e1zquez, E.: Anomaly-based network intrusion detection: techniques, systems and challenges. Comput. Secur. 28(1\u20132), 18\u201328 (2009)","journal-title":"Comput. Secur."},{"key":"6_CR12","doi-asserted-by":"publisher","unstructured":"Garc\u00eda-Teodoro, P., D\u00edaz-Verdejo, J., Maci\u00e1-Fern\u00e1ndez, G., V\u00e1zquez, E.: Anomaly-based network intrusion detection: techniques, systems and challenges. Comput. Secur. 28(1), 18\u201328 (2009). https:\/\/doi.org\/10.1016\/j.cose.2008.08.003. https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0167404808000692","DOI":"10.1016\/j.cose.2008.08.003"},{"key":"6_CR13","first-page":"721","volume":"20","author":"S Ghanti","year":"2018","unstructured":"Ghanti, S., Naik, G.M.: Defense techniques of SYN flood attack characterization and comparisons. Int. J. Netw. Secur. 20, 721\u2013729 (2018)","journal-title":"Int. J. Netw. Secur."},{"key":"6_CR14","doi-asserted-by":"crossref","unstructured":"Gordon, H., Park, C., Tushir, B., Liu, Y., Dezfouli, B.: An efficient SDN architecture for smart home security accelerated by FPGA. In: 2021 IEEE International Symposium on Local and Metropolitan Area Networks (LANMAN), pp. 1\u20133. IEEE (2021)","DOI":"10.1109\/LANMAN52105.2021.9478836"},{"key":"6_CR15","doi-asserted-by":"publisher","first-page":"104650","DOI":"10.1109\/access.2020.3000179","volume":"8","author":"H Hindy","year":"2020","unstructured":"Hindy, H., et al.: A taxonomy of network threats and the effect of current datasets on intrusion detection systems. IEEE Access 8, 104650\u2013104675 (2020). https:\/\/doi.org\/10.1109\/access.2020.3000179","journal-title":"IEEE Access"},{"issue":"4","key":"6_CR16","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1049\/iet-ifs.2017.0421","volume":"12","author":"T Ho","year":"2018","unstructured":"Ho, T., Cho, S.J., Oh, S.R.: Parallel multiple pattern matching schemes based on cuckoo filter for deep packet inspection on graphics processing units. IET Inf. Secur. 12(4), 381\u2013388 (2018)","journal-title":"IET Inf. Secur."},{"issue":"2","key":"6_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.5121\/ijdkp.2015.5201","volume":"5","author":"M Hossin","year":"2015","unstructured":"Hossin, M., Sulaiman, M.N.: A review on evaluation metrics for data classification evaluations. Int. J. Data Mining Knowl. Manag. Process 5(2), 1 (2015)","journal-title":"Int. J. Data Mining Knowl. Manag. Process"},{"key":"6_CR18","doi-asserted-by":"crossref","unstructured":"Ioannou, L., Fahmy, S.A.: Network intrusion detection using neural networks on FPGA SOCS. In: 2019 29th International Conference on Field Programmable Logic and Applications (FPL), pp. 232\u2013238. IEEE (2019)","DOI":"10.1109\/FPL.2019.00043"},{"key":"6_CR19","doi-asserted-by":"crossref","unstructured":"Kang, J., Kim, T., Park, J.: FPGA-based real-time abnormal packet detector for critical industrial network. In: 2019 IEEE Symposium on Computers and Communications (ISCC), pp. 1199\u20131203. IEEE (2019)","DOI":"10.1109\/ISCC47284.2019.8969630"},{"issue":"1","key":"6_CR20","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/j.jnca.2012.09.004","volume":"36","author":"HJ Liao","year":"2013","unstructured":"Liao, H.J., Lin, C.H.R., Lin, Y.C., Tung, K.Y.: Intrusion detection system: a comprehensive review. J. Netw. Comput. Appl. 36(1), 16\u201324 (2013)","journal-title":"J. Netw. Comput. Appl."},{"issue":"8","key":"6_CR21","first-page":"1459","volume":"67","author":"LA Maciel","year":"2019","unstructured":"Maciel, L.A., Souza, M.A., de Freitas, H.C.: Reconfigurable FPGA-based k-means\/k-modes architecture for network intrusion detection. IEEE Trans. Circuits Syst. II Express Briefs 67(8), 1459\u20131463 (2019)","journal-title":"IEEE Trans. Circuits Syst. II Express Briefs"},{"key":"6_CR22","doi-asserted-by":"publisher","unstructured":"Moustafa, N., Slay, J.: The evaluation of network anomaly detection systems: statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set. Inf. Secur. J. Glob. Perspect. 25(1\u20133), 18\u201331 (2016). https:\/\/doi.org\/10.1080\/19393555.2015.1125974","DOI":"10.1080\/19393555.2015.1125974"},{"issue":"1\/2","key":"6_CR23","first-page":"47","volume":"86","author":"T Murovic","year":"2019","unstructured":"Murovic, T., Trost, A.: Massively parallel combinational binary neural networks for edge processing. Elektrotehniski Vestnik 86(1\/2), 47\u201353 (2019)","journal-title":"Elektrotehniski Vestnik"},{"key":"6_CR24","doi-asserted-by":"publisher","DOI":"10.1016\/j.mejo.2020.104724","volume":"97","author":"T Murovi\u010d","year":"2020","unstructured":"Murovi\u010d, T., Trost, A.: Resource-optimized combinational binary neural network circuits. Microelectron. J. 97, 104724 (2020)","journal-title":"Microelectron. J."},{"key":"6_CR25","unstructured":"NetFPGA: NetFPGA 10G information (2023). https:\/\/netfpga.org\/NetFPGA-10G.html"},{"key":"6_CR26","doi-asserted-by":"publisher","unstructured":"Nordstr\u00f6m, T., Svensson, B.: Using and designing massively parallel computers for artificial neural networks. J. Parallel Distrib. Comput. 14(3), 260\u2013285 (1992). https:\/\/doi.org\/10.1016\/0743-7315(92)90068-X. https:\/\/www.sciencedirect.com\/science\/article\/pii\/074373159290068X","DOI":"10.1016\/0743-7315(92)90068-X"},{"key":"6_CR27","doi-asserted-by":"crossref","unstructured":"Sateesan, A., Vliegen, J., Daemen, J., Mentens, N.: Novel bloom filter algorithms and architectures for ultra-high-speed network security applications. In: 2020 23rd Euromicro Conference on Digital System Design (DSD), pp. 262\u2013269. IEEE (2020)","DOI":"10.1109\/DSD51259.2020.00050"},{"key":"6_CR28","unstructured":"Security today: Malicious DDoS attacks rise 150% in 2022 according to new report (2023). https:\/\/securitytoday.com\/articles\/2023\/02\/17\/malicious-ddos-attacks-rise-150-in-2022-according-to-new-report.aspx"},{"key":"6_CR29","doi-asserted-by":"publisher","unstructured":"Senie, D., Ferguson, P.: Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing. RFC 2827 (2000). https:\/\/doi.org\/10.17487\/RFC2827. https:\/\/www.rfc-editor.org\/info\/rfc2827","DOI":"10.17487\/RFC2827"},{"key":"6_CR30","unstructured":"Statista Research Department: Internet of things - number of connected devices worldwide 2015\u20132025 (2016). https:\/\/www.statista.com\/statistics\/471264\/iot-number-of-connected-devices-worldwide\/. Accessed 01 Apr 2023"},{"key":"6_CR31","doi-asserted-by":"publisher","unstructured":"Tavallaee, M., Bagheri, E., Lu, W., Ghorbani, A.A.: A detailed analysis of the KDD cup 99 data set. In: 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, pp. 1\u20136 (2009). https:\/\/doi.org\/10.1109\/CISDA.2009.5356528","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"6_CR32","unstructured":"Team, A.N.S.: 2022 in review: DDoS attack trends and insights (2023). https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/02\/21\/2022-in-review-ddos-attack-trends-and-insights\/. Accessed 01 Apr 2023"},{"key":"6_CR33","doi-asserted-by":"crossref","unstructured":"Wada, T., Matsumura, N., Nakano, K., Ito, Y.: Efficient byte stream pattern test using bloom filter with rolling hash functions on the FPGA. In: 2018 Sixth International Symposium on Computing and Networking (CANDAR), pp. 66\u201375. IEEE (2018)","DOI":"10.1109\/CANDAR.2018.00016"},{"issue":"1","key":"6_CR34","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/TNET.2006.890133","volume":"15","author":"H Wang","year":"2007","unstructured":"Wang, H., Jin, C., Shin, K.G.: Defense against spoofed IP traffic using hop-count filtering. IEEE\/ACM Trans. Networking 15(1), 40\u201353 (2007). https:\/\/doi.org\/10.1109\/TNET.2006.890133","journal-title":"IEEE\/ACM Trans. Networking"},{"key":"6_CR35","unstructured":"Zhao, Z., Sadok, H., Atre, N., Hoe, J.C., Sekar, V., Sherry, J.: Achieving 100Gbps intrusion prevention on a single server. In: Proceedings of the 14th USENIX Conference on Operating Systems Design and Implementation, pp. 1083\u20131100 (2020)"},{"issue":"5","key":"6_CR36","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1109\/MM.2014.61","volume":"34","author":"N Zilberman","year":"2014","unstructured":"Zilberman, N., Audzevich, Y., Covington, G.A., Moore, A.W.: NetFPGA SUME: Toward 100 Gbps as research commodity. IEEE Micro 34(5), 32\u201341 (2014). https:\/\/doi.org\/10.1109\/MM.2014.61","journal-title":"IEEE Micro"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2023 Workshops"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-37120-2_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,28]],"date-time":"2023-06-28T23:38:12Z","timestamp":1687995492000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-37120-2_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031371196","9783031371202"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-37120-2_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"29 June 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICCSA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computational Science and Its Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Athens","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Greece","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 July 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 July 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iccsa2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/iccsa.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Custom based on Cyberchair 4","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"283","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"67","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"13","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"24% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.5","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"8,5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"PHD Showcase Papers: 6(for main conf) \/ For ICCSA 2023 Workshops 876 subm sent, 350 full papers and 29 short papers accepted, additional PHD Showcase Papers: 2","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}