{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T00:40:07Z","timestamp":1746232807941,"version":"3.40.4"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319075686"},{"type":"electronic","value":"9783319075693"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-07569-3_18","type":"book-chapter","created":{"date-parts":[[2014,5,20]],"date-time":"2014-05-20T14:15:55Z","timestamp":1400595355000},"page":"214-228","source":"Crossref","is-referenced-by-count":0,"title":["A Bloom Filter-Based Monitoring Station for a Lawful Interception Platform"],"prefix":"10.1007","author":[{"given":"Gerson Rodr\u00edguez","family":"de los Santos","sequence":"first","affiliation":[]},{"given":"Jose Alberto","family":"Hern\u00e1ndez","sequence":"additional","affiliation":[]},{"given":"Manuel","family":"Urue\u00f1a","sequence":"additional","affiliation":[]},{"given":"Alfonso","family":"Mu\u00f1oz","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"18_CR1","doi-asserted-by":"publisher","first-page":"485","DOI":"10.1080\/15427951.2004.10129096","volume":"1","author":"A. Broder","year":"2004","unstructured":"Broder, A., Mitzenmacher, M.: Network applications of Bloom filters: A survey. Internet Mathematics\u00a01(4), 485\u2013509 (2004)","journal-title":"Internet Mathematics"},{"key":"18_CR2","doi-asserted-by":"crossref","unstructured":"Mu, S., Zhang, X., Zhang, N., Lu, J., Deng, Y.S., Zhang, S.: IP routing processing with graphic processors. In: Design, Automation Test in Europe Conference Exhibition (DATE), pp. 93\u201398 (2010)","DOI":"10.1109\/DATE.2010.5457229"},{"key":"18_CR3","doi-asserted-by":"crossref","unstructured":"Zhao, J., Zhang, X., Wang, X., Deng, Y., Fu, X.: Exploiting graphics processors for high-performance IP lookup in software routers. In: 2011 Proceedings IEEE INFOCOM, pp. 301\u2013305 (2011)","DOI":"10.1109\/INFCOM.2011.5935144"},{"key":"18_CR4","doi-asserted-by":"crossref","unstructured":"Smith, R., Goyal, N., Ormont, J., Sankaralingam, K., Estan, C.: Evaluating GPUs for network packet signature matching. In: IEEE International Symposium on Performance Analysis of Systems and Software, ISPASS 2009, pp. 175\u2013184 (2009)","DOI":"10.1109\/ISPASS.2009.4919649"},{"key":"18_CR5","doi-asserted-by":"crossref","unstructured":"Wang, L., Chen, S., Tang, Y., Su, J.: Gregex: GPU based high speed regular expression matching engine. In: 2011 Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), pp. 366\u2013370 (2011)","DOI":"10.1109\/IMIS.2011.107"},{"key":"18_CR6","doi-asserted-by":"crossref","unstructured":"Huang, N.-F., Hung, H.-W., Lai, S.-H., Chu, Y.-M., Tsai, W.-Y.: A GPU-based multiple-pattern matching algorithm for network intrusion detection systems. In: 22nd International Conference on Advanced Information Networking and Applications - Workshops, AINAW 2008, pp. 62\u201367 (2008)","DOI":"10.1109\/WAINA.2008.145"},{"key":"18_CR7","doi-asserted-by":"crossref","unstructured":"Lin, C.-H., Liu, C.-H., Chang, S.-C.: Accelerating regular expression matching using hierarchical parallel machines on GPU. In: 2011 IEEE Global Telecommunications Conference (GLOBECOM 2011), pp. 1\u20135 (2011)","DOI":"10.1109\/GLOCOM.2011.6133663"},{"issue":"10","key":"18_CR8","doi-asserted-by":"publisher","first-page":"1934","DOI":"10.1109\/TPDS.2012.56","volume":"23","author":"Q. Wu","year":"2012","unstructured":"Wu, Q., Wolf, T.: Runtime task allocation in multicore packet processing systems. IEEE Transactions on Parallel and Distributed Systems\u00a023(10), 1934\u20131943 (2012)","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"18_CR9","doi-asserted-by":"crossref","unstructured":"Li, Y., Shan, L., Qiao, X.: A parallel packet processing runtime system on multi-core network processors. In: 2012 11th International Symposium on Distributed Computing and Applications to Business, Engineering Science (DCABES), pp. 67\u201371 (2012)","DOI":"10.1109\/DCABES.2012.59"},{"key":"18_CR10","doi-asserted-by":"crossref","unstructured":"Yamashita, Y., Tsuru, M.: Rule pattern parallelization of packet filters on muti-core environments. In: 2011 IEEE 13th International Conference on High Performance Computing and Communications (HPCC), pp. 116\u2013125 (2011)","DOI":"10.1109\/HPCC.2011.25"},{"issue":"5","key":"18_CR11","doi-asserted-by":"publisher","first-page":"1426","DOI":"10.1109\/TNET.2011.2177858","volume":"20","author":"D. Guo","year":"2012","unstructured":"Guo, D., Bhuyan, L.N., Liu, B.: An efficient parallelized L7-filter design for multicore servers. IEEE\/ACM Transactions on Networking\u00a020(5), 1426\u20131439 (2012)","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"18_CR12","unstructured":"Application Layer Packet Classifier for Linux (2013)"},{"key":"18_CR13","doi-asserted-by":"crossref","unstructured":"Huang, N.-F., Hung, H.-W., Tsai, W.-Y.: A unique-pattern based pre-filtering method for rule matching of network security. In: 2012 18th Asia-Pacific Conference on Communications (APCC), pp. 744\u2013748 (2012)","DOI":"10.1109\/APCC.2012.6388294"},{"key":"18_CR14","doi-asserted-by":"crossref","unstructured":"Song, H., Hao, F., Kodialam, M., Lakshman, T.V.: IPv6 lookups using distributed and load balanced bloom filters for 100Gbps core router line cards. In: IEEE INFOCOM 2009, pp. 2518\u20132526 (2009)","DOI":"10.1109\/INFCOM.2009.5062180"},{"key":"18_CR15","unstructured":"Dharmapurikar, S., Krishnamurthy, P., Sproull, T., Lockwood, J.: Deep packet inspection using parallel Bloom filters. In: Proceedings of the 11th Symposium on High Performance Interconnects, pp. 44\u201351 (2003)"},{"issue":"1","key":"18_CR16","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1109\/MM.2004.1268997","volume":"24","author":"S. Dharmapurikar","year":"2004","unstructured":"Dharmapurikar, S., Krishnamurthy, P., Sproull, T.S., Lockwood, J.W.: Deep packet inspection using parallel Bloom filters. IEEE Micro\u00a024(1), 52\u201361 (2004)","journal-title":"IEEE Micro"},{"key":"18_CR17","doi-asserted-by":"crossref","unstructured":"Attig, M., Dharmapurikar, S., Lockwood, J.: Implementation results of Bloom filters for string matching. In: 12th Annual IEEE Symposium on Field-Programmable Custom Computing Machines, FCCM 2004, pp. 322\u2013323 (2004)","DOI":"10.1109\/FCCM.2004.41"},{"key":"18_CR18","doi-asserted-by":"crossref","unstructured":"Attig, M., Lockwood, J.: SIFT: snort intrusion filter for TCP. In: Proceedings of the 13th Symposium on High Performance Interconnects, pp. 121\u2013127 (2005)","DOI":"10.1109\/CONECT.2005.33"},{"key":"18_CR19","doi-asserted-by":"crossref","unstructured":"Van Lunteren, J.: High-performance pattern-matching for intrusion detection. In: Proceedings of the 25th IEEE International Conference on Computer Communications, INFOCOM 2006, pp. 1\u201313 (2006)","DOI":"10.1109\/INFOCOM.2006.204"},{"key":"18_CR20","doi-asserted-by":"crossref","unstructured":"Tuck, N., Sherwood, T., Calder, B., Varghese, G.: Deterministic memory-efficient string matching algorithms for intrusion detection. In: Twenty-third Annual Joint Conference of the IEEE Computer and Communications Societies, INFOCOM 2004, vol.\u00a04, pp. 2628\u20132639 (2004)","DOI":"10.1109\/INFCOM.2004.1354682"},{"key":"18_CR21","doi-asserted-by":"crossref","unstructured":"Ho, J., Lemieux, G.G.F.: PERG: A scalable FPGA-based pattern-matching engine with consolidated bloomier filters. In: International Conference on ICECE Technology, FPT 2008, pp. 73\u201380 (2008)","DOI":"10.1109\/FPT.2008.4762368"},{"key":"18_CR22","doi-asserted-by":"crossref","unstructured":"Bando, M., Artan, N.S., Wei, R., Guo, X., Chao, H.J.: Range hash for regular expression pre-filtering. In: 2010 ACM\/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS), pp. 1\u201312 (2010)","DOI":"10.1145\/1872007.1872032"},{"key":"18_CR23","doi-asserted-by":"crossref","unstructured":"Cho, Y.H., Mangione-Smith, W.H.: Fast reconfiguring deep packet filter for 1+ gigabit network. In: 13th Annual IEEE Symposium on Field-Programmable Custom Computing Machines, FCCM 2005, pp. 215\u2013224 (2005)","DOI":"10.1109\/FCCM.2005.34"},{"key":"18_CR24","doi-asserted-by":"crossref","unstructured":"Ajami, R., Dinh, A.: Design a hardware network firewall on FPGA. In: 2011 24th Canadian Conference on Electrical and Computer Engineering (CCECE), pp. 000674\u2013000678 (2011)","DOI":"10.1109\/CCECE.2011.6030538"},{"key":"18_CR25","doi-asserted-by":"crossref","unstructured":"Kayssi, A., Harik, L., Ferzli, R., Fawaz, M.: FPGA-based internet protocol firewall chip. In: The 7th IEEE International Conference on Electronics, Circuits and Systems, ICECS 2000., vol.\u00a01, pp. 316\u2013319 (2000)","DOI":"10.1109\/ICECS.2000.911545"},{"key":"18_CR26","doi-asserted-by":"crossref","unstructured":"Park, S.-K., Oh, J.-T., Jang, J.-S.: High-speed attack mitigation engine by packet filtering and rate-limiting using fpga. In: The 8th International Conference on Advanced Communication Technology, ICACT 2006, vol.\u00a01, pp. 6 pp.\u2013685 (2006)","DOI":"10.1109\/ICACT.2006.206058"},{"key":"18_CR27","unstructured":"Aparicio, R., Urue\u00f1a, M., Mu\u00f1oz, A., Rodr\u00edguez, G., Morcuende, S.: INDECT Lawful Interception platform: Overview of ILIP decoding and analysis station. Jornadas de Ingenier\u00eda Telem\u00e1tica (JITEL) (2013) (accepted for publication)"},{"key":"18_CR28","unstructured":"Urue\u00f1a, M., Mu\u00f1oz, A., Aparicio, R., Rodr\u00edguez, G.: Digital Wiretap Warrant: Protecting civil liberties in ETSI Lawful Interception (review ongoing). Computer and Security"},{"key":"18_CR29","unstructured":"Knuth, D.: The Art of Computer Programming, 2nd edn., vol.\u00a03. Addison-Wesley (1998)"},{"key":"18_CR30","unstructured":"NetFPGA home page (2013)"}],"container-title":["Communications in Computer and Information Science","Multimedia Communications, Services and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-07569-3_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T23:58:33Z","timestamp":1746230313000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-07569-3_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319075686","9783319075693"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-07569-3_18","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2014]]}}}