{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T18:57:36Z","timestamp":1772823456555,"version":"3.50.1"},"publisher-location":"Cham","reference-count":36,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319263618","type":"print"},{"value":"9783319263625","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-26362-5_5","type":"book-chapter","created":{"date-parts":[[2015,10,26]],"date-time":"2015-10-26T14:10:45Z","timestamp":1445868645000},"page":"89-110","source":"Crossref","is-referenced-by-count":11,"title":["Haetae: Scaling the Performance of Network Intrusion Detection with Many-Core Processors"],"prefix":"10.1007","author":[{"given":"Jaehyun","family":"Nam","sequence":"first","affiliation":[]},{"given":"Muhammad","family":"Jamshed","sequence":"additional","affiliation":[]},{"given":"Byungkwon","family":"Choi","sequence":"additional","affiliation":[]},{"given":"Dongsu","family":"Han","sequence":"additional","affiliation":[]},{"given":"KyoungSoo","family":"Park","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,12]]},"reference":[{"key":"5_CR1","unstructured":"A hash function for hash table lookup. \n                      http:\/\/www.burtleburtle.net\/bob\/hash\/doobs.html"},{"key":"5_CR2","unstructured":"AMD: OpenCL Zone. \n                      http:\/\/developer.amd.com\/tools-and-sdks\/"},{"key":"5_CR3","unstructured":"AMD Opteron Processor Solutions. \n                      http:\/\/products.amd.com\/en-gb\/opteroncpuresult.aspx"},{"key":"5_CR4","unstructured":"Check Point IP Appliances. \n                      http:\/\/www.checkfirewalls.com\/IP-Overview.asp"},{"key":"5_CR5","unstructured":"EZchip TILEncore-Gx72 Intelligent Application Adapter. \n                      http:\/\/tilera.com\/products\/?ezchip=588&spage=606"},{"key":"5_CR6","unstructured":"Intel Data Direct I\/O Technology. \n                      http:\/\/www.intel.com\/content\/www\/us\/en\/io\/direct-data-i-o.html"},{"key":"5_CR7","unstructured":"Intel DPDK. \n                      http:\/\/dpdk.org\/"},{"key":"5_CR8","unstructured":"Kalray MPPA 256 Many-core processors. \n                      http:\/\/www.kalrayinc.com\/kalray\/products\/#processors"},{"key":"5_CR9","unstructured":"NVIDIA: What is GPU Computing? \n                      http:\/\/www.nvidia.com\/object\/what-is-gpu-computing.html"},{"key":"5_CR10","unstructured":"PCAP. \n                      http:\/\/www.tcpdump.org\/pcap.html"},{"key":"5_CR11","unstructured":"$${\\rm {PF\\_RING}}$$\n                    . \n                      http:\/\/www.ntop.org\/products\/pf_ring"},{"key":"5_CR12","unstructured":"SnortSP (Security Platform). \n                      http:\/\/blog.snort.org\/2014\/12\/introducing-snort-30.html"},{"key":"5_CR13","unstructured":"Sourcefire 3D Sensors Series. \n                      http:\/\/www.ipsworks.com\/3D-Sensors-Series.asp"},{"key":"5_CR14","unstructured":"Suricata Open Source IDS\/IPS\/NSM engine. \n                      http:\/\/suricata-ids.org\/"},{"key":"5_CR15","unstructured":"The Intel Xeon Processor E7 v2 Family. \n                      http:\/\/www.intel.com\/content\/www\/us\/en\/processors\/xeon\/xeon-processor-e7-family.html"},{"key":"5_CR16","unstructured":"TILE-Gx Processor Family. \n                      http:\/\/tilera.com\/products\/?ezchip=585&spage=614"},{"issue":"6","key":"5_CR17","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1145\/360825.360855","volume":"18","author":"AV Aho","year":"1975","unstructured":"Aho, A.V., Corasick, M.J.: Efficient string matching: an aid to bibliographic search. Commun. ACM 18(6), 333\u2013340 (1975)","journal-title":"Commun. ACM"},{"key":"5_CR18","doi-asserted-by":"crossref","unstructured":"Baker, Z.K., Prasanna, V.K.: Time and area efficient pattern matching on FPGAs. In: Proceedings of the ACM\/SIGDA International Symposium on Field-Programmable Gate Arrays (FPGA), pp. 223\u2013232. ACM (2004)","DOI":"10.1145\/968280.968312"},{"key":"5_CR19","unstructured":"Chen, X., Wu, Y., Xu, L., Xue, Y., Li, J.: Para-snort: A multi-thread snort on multi-core ia platform. In: Proceedings of the Parallel and Distributed Computing and Systems (PDCS) (2009)"},{"key":"5_CR20","doi-asserted-by":"crossref","unstructured":"Han, S., Jang, K., Park, K., Moon, S.: Packetshader: a gpu-accelerated software router, vol. 41, pp. 195\u2013206 (2011)","DOI":"10.1145\/1851275.1851207"},{"key":"5_CR21","unstructured":"Handley, M., Paxson, V., Kreibich, C.: Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics. In: USENIX Security Symposium, pp. 115\u2013131 (2001)"},{"key":"5_CR22","doi-asserted-by":"crossref","unstructured":"Huang, N.F., Hung, H.W., Lai, S.H., Chu, Y.M., Tsai, W.Y.: A GPU-based multiple-pattern matching algorithm for network intrusion detection systems. In: Proceedings of the International Conference on Advanced Information Networking and Applications - Workshops (AINAW), pp. 62\u201367. IEEE (2008)","DOI":"10.1109\/WAINA.2008.145"},{"key":"5_CR23","doi-asserted-by":"crossref","unstructured":"Jamshed, M.A., Lee, J., Moon, S., Yun, I., Kim, D., Lee, S., Yi, Y., Park, K.: Kargus: a highly-scalable software-based intrusion detection system. In: Proceedings of the ACM Conference on Computer and Communications Security (CCS), pp. 317\u2013328 (2012)","DOI":"10.1145\/2382196.2382232"},{"key":"5_CR24","doi-asserted-by":"crossref","unstructured":"Jiang, H., Zhang, G., Xie, G., Salamatian, K., Mathy, L.: Scalable high-performance parallel design for network intrusion detection systems on many-core processors. In: Proceedings of the ACM\/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS). IEEE Press (2013)","DOI":"10.1109\/ANCS.2013.6665196"},{"key":"5_CR25","doi-asserted-by":"crossref","unstructured":"Kuon, I., Tessier, R., Rose, J.: FPGA architecture: Survey and challenges. In: Foundations and Trends in Electronic Design Automation, vol. 2, pp. 135\u2013253. Now Publishers Inc. (2008)","DOI":"10.1561\/1000000005"},{"key":"5_CR26","unstructured":"Meiners, C.R., Patel, J., Norige, E., Torng, E., Liu, A.X.: Fast regular expression matching using small TCAMs for network intrusion detection and prevention systems. In: Proceedings of the 19th USENIX conference on Security, pp. 8\u20138. USENIX Association (2010)"},{"key":"5_CR27","doi-asserted-by":"crossref","unstructured":"Mitra, A., Najjar, W., Bhuyan, L.: Compiling PCRE to FPGA for accelerating Snort IDS. In: Proceedings of the ACM\/IEEE Symposium on Architecture for Networking and Communications Systems (ANCS), pp. 127\u2013136. ACM (2007)","DOI":"10.1145\/1323548.1323571"},{"key":"5_CR28","unstructured":"Rizzo, L.: netmap: a novel framework for fast packet i\/o. In: USENIX Annual Technical Conference. pp. 101\u2013112 (2012)"},{"key":"5_CR29","unstructured":"Roesch, M., et al.: Snort - lightweight intrusion detection for networks. In: Proceedings of the USENIX Systems Administration Conference (LISA) (1999)"},{"key":"5_CR30","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1145\/1402946.1402983","volume":"38","author":"R Smith","year":"2008","unstructured":"Smith, R., Estan, C., Jha, S., Kong, S.: Deflating the big bang: fast and scalable deep packet inspection with extended finite automata. ACM SIGCOMM Comput. Commun. Rev. 38, 207\u2013218 (2008)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"5_CR31","doi-asserted-by":"crossref","unstructured":"Smith, R., Goyal, N., Ormont, J., Sankaralingam, K., Estan, C.: Evaluating gpus for network packet signature matching. In: Proceedings of the IEEE International Symposium on Performance Analysis of Systems and Software (ISPASS) (2009)","DOI":"10.1109\/ISPASS.2009.4919649"},{"key":"5_CR32","doi-asserted-by":"crossref","unstructured":"Tan, L., Sherwood, T.: A high throughput string matching architecture for intrusion detection and prevention. In: ACM SIGARCH Computer Architecture News, vol. 33, pp. 112\u2013122. IEEE Computer Society (2005)","DOI":"10.1145\/1080695.1069981"},{"key":"5_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1007\/978-3-540-87403-4_7","volume-title":"Recent Advances in Intrusion Detection","author":"G Vasiliadis","year":"2008","unstructured":"Vasiliadis, G., Antonatos, S., Polychronakis, M., Markatos, E.P., Ioannidis, S.: Gnort: high performance network intrusion detection using graphics processors. In: Lippmann, R., Kirda, E., Trachtenberg, A. (eds.) RAID 2008. LNCS, vol. 5230, pp. 116\u2013134. Springer, Heidelberg (2008)"},{"key":"5_CR34","doi-asserted-by":"crossref","unstructured":"Vasiliadis, G., Polychronakis, M., Ioannidis, S.: Midea: a multi-parallel intrusion detection architecture. In: Proceedings of the ACM Conference on Computer and Communications Security (CCS), pp. 297\u2013308 (2011)","DOI":"10.1145\/2046707.2046741"},{"key":"5_CR35","doi-asserted-by":"crossref","unstructured":"Woo, S., Jeong, E., Park, S., Lee, J., Ihm, S., Park, K.: Comparison of caching strategies in modern cellular backhaul networks. In:Proceeding of the Annual International Conference on Mobile Systems, Applications, and Services (MobiSys), pp. 319\u2013332. ACM (2013)","DOI":"10.1145\/2462456.2464442"},{"key":"5_CR36","unstructured":"Yu, F., Katz, R.H., Lakshman, T.V.: Gigabit rate packet pattern-matching using tcam. In: Proceedings of the IEEE International Conference on Network Protocols(ICNP), pp. 174\u2013183. IEEE (2004)"}],"container-title":["Lecture Notes in Computer Science","Research in Attacks, Intrusions, and Defenses"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-26362-5_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T09:21:24Z","timestamp":1559294484000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-26362-5_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319263618","9783319263625"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-26362-5_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015]]}}}