{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T06:21:36Z","timestamp":1767853296357,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":38,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540874027","type":"print"},{"value":"9783540874034","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-87403-4_7","type":"book-chapter","created":{"date-parts":[[2008,9,17]],"date-time":"2008-09-17T11:42:05Z","timestamp":1221651725000},"page":"116-134","source":"Crossref","is-referenced-by-count":177,"title":["Gnort: High Performance Network Intrusion Detection Using Graphics Processors"],"prefix":"10.1007","author":[{"given":"Giorgos","family":"Vasiliadis","sequence":"first","affiliation":[]},{"given":"Spiros","family":"Antonatos","sequence":"additional","affiliation":[]},{"given":"Michalis","family":"Polychronakis","sequence":"additional","affiliation":[]},{"given":"Evangelos P.","family":"Markatos","sequence":"additional","affiliation":[]},{"given":"Sotiris","family":"Ioannidis","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"6","key":"7_CR1","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1145\/360825.360855","volume":"18","author":"A.V. Aho","year":"1975","unstructured":"Aho, A.V., Corasick, M.J.: Efficient string matching: an aid to bibliographic search. Communications of the ACM\u00a018(6), 333\u2013340 (1975)","journal-title":"Communications of the ACM"},{"key":"7_CR2","doi-asserted-by":"crossref","unstructured":"Antonatos, S., Anagnostakis, K., Markatos, E.: Generating realistic workloads for network intrusion detection systems. In: Proceedings of the 4th ACM Workshop on Software and Performance (January 2004)","DOI":"10.1145\/974044.974078"},{"key":"7_CR3","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1109\/FCCM.2005.7","volume-title":"Proceedings of the 13th Annual IEEE Symposium on Field-Programmable Custom Computing Machines (FCCM 2005)","author":"M. Attig","year":"2005","unstructured":"Attig, M., Lockwood, J.: A framework for rule processing in reconfigurable network systems. In: Proceedings of the 13th Annual IEEE Symposium on Field-Programmable Custom Computing Machines (FCCM 2005), Washington, DC, USA, 2005, pp. 225\u2013234. IEEE Computer Society Press, Los Alamitos (2005)"},{"key":"7_CR4","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1145\/968280.968312","volume-title":"Proceedings of the 2004 ACM\/SIGDA 12th International Symposium on Field Programmable Gate Arrays (FPGA 2004)","author":"Z.K. Baker","year":"2004","unstructured":"Baker, Z.K., Prasanna, V.K.: Time and area efficient pattern matching on FPGAs. In: Proceedings of the 2004 ACM\/SIGDA 12th International Symposium on Field Programmable Gate Arrays (FPGA 2004), pp. 223\u2013232. ACM, New York (2004)"},{"key":"7_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1007\/11663812_6","volume-title":"Recent Advances in Intrusion Detection","author":"H. Bos","year":"2006","unstructured":"Bos, H., Huang, K.: Towards software-based signature detection for intrusion prevention on the network card. In: Valdes, A., Zamboni, D. (eds.) RAID 2005. LNCS, vol.\u00a03858, pp. 102\u2013123. Springer, Heidelberg (2006)"},{"issue":"10","key":"7_CR6","doi-asserted-by":"crossref","first-page":"762","DOI":"10.1145\/359842.359859","volume":"20","author":"R.S. Boyer","year":"1977","unstructured":"Boyer, R.S., Moore, J.S.: A fast string searching algorithm. Communications of the Association for Computing Machinery\u00a020(10), 762\u2013772 (1977)","journal-title":"Communications of the Association for Computing Machinery"},{"key":"7_CR7","doi-asserted-by":"crossref","unstructured":"Cabrera, J.B.D., Gosar, J., Lee, W., Mehra, R.K.: On the statistical distribution of processing times in network intrusion detection. In: 43rd IEEE Conference on Decision and Control, December 2004, pp. 75\u201380 (2004)","DOI":"10.1109\/CDC.2004.1428609"},{"key":"7_CR8","doi-asserted-by":"crossref","unstructured":"Clark, C., Lee, W., Schimmel, D., Contis, D., Kone, M., Thomas, A.: A hardware platform for network intrusion detection and prevention. In: Proceedings of the 3rd Workshop on Network Processors and Applications (NP3) (2004)","DOI":"10.1016\/B978-012088476-6\/50007-1"},{"key":"7_CR9","doi-asserted-by":"crossref","unstructured":"Coit, C., Staniford, S., McAlerney, J.: Towards faster string matching for intrusion detection or exceeding the speed of Snort. In: Proceedings of DARPA Information Survivability Conference & Exposition II (DISCEX 2001) (June 2001)","DOI":"10.1109\/DISCEX.2001.932231"},{"key":"7_CR10","doi-asserted-by":"crossref","unstructured":"Commentz-Walter, B.: A string matching algorithm fast on the average. In: Proceedings of the 6th International Colloquium on Automata, Languages and Programming, pp. 118\u2013131.","DOI":"10.1007\/3-540-09510-1_10"},{"key":"7_CR11","doi-asserted-by":"crossref","unstructured":"Cook, D.L., Ioannidis, J., Keromytis, A.D., Luck, J.: Cryptographics: Secret key cryptography using graphics cards. In: Proceedings of RSA Conference, Cryptographer\u2019s Track (CT-RSA), pp. 334\u2013350 (2005)","DOI":"10.1007\/978-3-540-30574-3_23"},{"key":"7_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1007\/11856214_16","volume-title":"Recent Advances in Intrusion Detection","author":"W. Bruijn de","year":"2006","unstructured":"de Bruijn, W., Slowinska, A., van Reeuwijk, K., Hruby, T., Xu, L., Bos, H.: SafeCard: a Gigabit IPS on the network card. In: Zamboni, D., Kr\u00fcgel, C. (eds.) RAID 2006. LNCS, vol.\u00a04219, pp. 311\u2013330. Springer, Heidelberg (2006)"},{"issue":"1","key":"7_CR13","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1109\/MM.2004.1268997","volume":"24","author":"S. Dharmapurikar","year":"2004","unstructured":"Dharmapurikar, S., Krishnamurthy, P., Sproull, T.S., Lockwood, J.W.: Deep packet inspection using parallel bloom filters. IEEE Micro\u00a024(1), 52\u201361 (2004)","journal-title":"IEEE Micro"},{"key":"7_CR14","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1145\/1095890.1095916","volume-title":"Proceedings of the 2005 ACM symposium on Architecture for networking and communications systems (ANCS 2005)","author":"S. Dharmapurikar","year":"2005","unstructured":"Dharmapurikar, S., Lockwood, J.: Fast and scalable pattern matching for content filtering. In: Proceedings of the 2005 ACM symposium on Architecture for networking and communications systems (ANCS 2005), pp. 183\u2013192. ACM, New York (2005)"},{"key":"7_CR15","doi-asserted-by":"crossref","unstructured":"Fisk, M., Varghese, G.: Applying fast string matching to intrusion detection. Technical Repor In preparation, successor to UCSD TR CS2001-0670, University of California, San Diego (2002)","DOI":"10.21236\/ADA406266"},{"key":"7_CR16","unstructured":"C. IOS. IPS deployment guide, http:\/\/www.cisco.com"},{"key":"7_CR17","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1109\/ACSAC.2006.35","volume-title":"Proceedings of the 22nd Annual Computer Security Applications Conference on Annual Computer Security Applications Conference (ACSAC 2006)","author":"N. Jacob","year":"2006","unstructured":"Jacob, N., Brodley, C.: Offloading IDS computation to the GPU. In: Security Applications Conference on Annual Computer Security Applications Conference (ACSAC 2006), Washington, DC, USA, pp. 371\u2013380. IEEE Computer Society, Los Alamitos (2006)"},{"issue":"2","key":"7_CR18","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1137\/0206024","volume":"6","author":"D.E. Knuth","year":"1977","unstructured":"Knuth, D.E., Morris, J., Pratt, V.: Fast pattern matching in strings. SIAM Journal on Computing\u00a06(2), 127\u2013146 (1977)","journal-title":"SIAM Journal on Computing"},{"key":"7_CR19","doi-asserted-by":"crossref","unstructured":"Kruegel, C., Valeur, F., Vigna, G., Kemmerer, R.: Stateful intrusion detection for high-speed networks. In: Proceedings of the IEEE Symposium on Security and Privacy, May 2002, pp. 285\u2013294 (2002)","DOI":"10.1109\/SECPRI.2002.1004378"},{"key":"7_CR20","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1016\/j.diin.2007.06.014","volume":"1","author":"G.G.R.I. Lodovico Marziale","year":"2007","unstructured":"Lodovico Marziale, G.G.R.I., Roussev, V.: Massive threading: Using GPUs to increase the performance of digital forensics tools. Digital Investigation\u00a01, 73\u201381 (2007)","journal-title":"Digital Investigation"},{"key":"7_CR21","unstructured":"McCanne, S., Leres, C., Jacobson, V.: libpcap. Lawrence Berkeley Laboratory, Berkeley, http:\/\/www.tcpdump.org\/"},{"key":"7_CR22","unstructured":"Norton, M.: Optimizing pattern matching for intrusion detection (July 2004), http:\/\/docs.idsresearch.org\/OptimizingPatternMatchingForIDS.pdf"},{"key":"7_CR23","unstructured":"NVIDIA. NVIDIA CUDA Compute Unified Device Architecture Programming Guide, version 1.1, http:\/\/developer.download.nvidia.com\/compute\/cuda\/1_1\/NVIDIA_CUDA_Programming_Guide_1.1.pdf ."},{"key":"7_CR24","unstructured":"Paxson, V.: Bro: A system for detecting network intruders in real-time. In: Proceedings of the 7th conference on USENIX Security Symposium (SSYM 1998), Berkeley, CA, USA, p. 3. USENIX Association (1998)"},{"key":"7_CR25","doi-asserted-by":"crossref","unstructured":"Paxson, V., Sommer, R., Weaver, N.: An architecture for exploiting multi-core processors to parallelize network intrusion prevention. In: Proceedings of the IEEE Sarnoff Symposium (May 2007)","DOI":"10.1109\/SARNOF.2007.4567341"},{"key":"7_CR26","unstructured":"Roesch, M.: Snort: Lightweight intrusion detection for networks. In: Proceedings of the 1999 USENIX LISA Systems Administration Conference (November 1999)"},{"key":"7_CR27","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1145\/1062261.1062314","volume-title":"CF 2005: Proceedings of the 2nd conference on Computing frontiers","author":"L. Schaelicke","year":"2005","unstructured":"Schaelicke, L., Wheeler, K., Freeland, C.: SPANIDS: a scalable network intrusion detection loadbalancer. In: CF 2005: Proceedings of the 2nd conference on Computing frontiers, pp. 315\u2013322. ACM, New York (2005)"},{"key":"7_CR28","unstructured":"Sidhu, R., Prasanna, V.: Fast regular expression matching using FPGAs. In: IEEE Symposium on Field-Programmable Custom Computing Machines (FCCM 2001) (2001)"},{"issue":"1","key":"7_CR29","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1145\/1132462.1132464","volume":"3","author":"L. Tan","year":"2006","unstructured":"Tan, L., Brotherton, B., Sherwood, T.: Bit-split string-matching engines for intrusion detection and prevention. ACM Transactions on Architecture and Code Optimization\u00a03(1), 3\u201334 (2006)","journal-title":"ACM Transactions on Architecture and Code Optimization"},{"key":"7_CR30","unstructured":"The Snort Project. Snort users manual 2.8.0, http:\/\/www.snort.org\/docs\/snort_manual\/2.8.0\/snort_manual.pdf"},{"key":"7_CR31","doi-asserted-by":"crossref","unstructured":"Tuck, N., Sherwood, T., Calder, B., Varghese, G.: Deterministic memory-efficient string matching algorithms for intrusion detection. In: Proceedings of the IEEE Infocom Conference, pp. 333\u2013340 (2004)","DOI":"10.1109\/INFCOM.2004.1354682"},{"key":"7_CR32","unstructured":"Turner, A.: Tcpreplay, http:\/\/tcpreplay.synfin.net\/trac\/"},{"key":"7_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1007\/978-3-540-74320-0_6","volume-title":"Recent Advances in Intrusion Detection","author":"M. Vallentin","year":"2007","unstructured":"Vallentin, M., Sommer, R., Lee, J., Leres, C., Paxson, V., Tierney, B.: The NIDS cluster: Scalable, stateful network intrusion detection on commodity hardware. In: Kruegel, C., Lippmann, R., Clark, A. (eds.) RAID 2007. LNCS, vol.\u00a04637, pp. 107\u2013126. Springer, Heidelberg (2007)"},{"key":"7_CR34","doi-asserted-by":"crossref","unstructured":"Watanabe, K., Tsuruoka, N., Himeno, R.: Performance of network intrusion detection cluster system. In: Proceedings of The 5th International Symposium on High Performance Computing (ISHPC-V) (2003)","DOI":"10.1007\/978-3-540-39707-6_22"},{"key":"7_CR35","unstructured":"Wood, P.: libpcap-mmap, http:\/\/public.lanl.gov\/cpw\/"},{"key":"7_CR36","unstructured":"Wu, S., Manber, U.: A fast algorithm for multi-pattern searching. Technical Report TR-94-17 (1994)"},{"key":"7_CR37","first-page":"174","volume-title":"Proceedings of the 12th IEEE International Conference on Network Protocols (ICNP 2004)","author":"F. Yu","year":"2004","unstructured":"Yu, F., Katz, R.H., Lakshman, T.V.: Gigabit Rate Packet Pattern-Matching Using TCAM. In: Proceedings of the 12th IEEE International Conference on Network Protocols (ICNP 2004), Washington, DC, USA, October 2004, pp. 174\u2013183. IEEE Computer Society, Los Alamitos (2004)"},{"key":"7_CR38","doi-asserted-by":"crossref","unstructured":"Yusuf, S., Luk, W.: Bitwise optimised CAM for network intrusion detection systems. In: Proceedings of International Conference on Field Programmable Logic and Applications, pp. 444\u2013449 (2005)","DOI":"10.1109\/FPL.2005.1515762"}],"container-title":["Lecture Notes in Computer Science","Recent Advances in Intrusion Detection"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-87403-4_7.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,31]],"date-time":"2025-01-31T23:32:30Z","timestamp":1738366350000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-87403-4_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540874027","9783540874034"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-87403-4_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[]}}