{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T02:19:12Z","timestamp":1767838752544,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":31,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642043413","type":"print"},{"value":"9783642043420","type":"electronic"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-04342-0_14","type":"book-chapter","created":{"date-parts":[[2009,9,28]],"date-time":"2009-09-28T23:00:22Z","timestamp":1254178822000},"page":"265-283","source":"Crossref","is-referenced-by-count":77,"title":["Regular Expression Matching on Graphics Hardware for Intrusion Detection"],"prefix":"10.1007","author":[{"given":"Giorgos","family":"Vasiliadis","sequence":"first","affiliation":[]},{"given":"Michalis","family":"Polychronakis","sequence":"additional","affiliation":[]},{"given":"Spiros","family":"Antonatos","sequence":"additional","affiliation":[]},{"given":"Evangelos P.","family":"Markatos","sequence":"additional","affiliation":[]},{"given":"Sotiris","family":"Ioannidis","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"14_CR1","unstructured":"Pcre: Perl compatible regular expressions, http:\/\/www.pcre.org"},{"key":"14_CR2","doi-asserted-by":"crossref","unstructured":"Testing intrusion detection systems: a critique of the 1998 and 1999 darpa intrusion detection system evaluations as performed by lincoln laboratory. ACM Trans. Inf. Syst. Secur.\u00a03(4), 262\u2013294 (2000)","DOI":"10.1145\/382912.382923"},{"issue":"6","key":"14_CR3","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1145\/360825.360855","volume":"18","author":"A.V. Aho","year":"1975","unstructured":"Aho, A.V., Corasick, M.J.: Efficient string matching: an aid to bibliographic search. Communications of the ACM\u00a018(6), 333\u2013340 (1975)","journal-title":"Communications of the ACM"},{"key":"14_CR4","first-page":"1","volume-title":"CoNEXT 2007: Proceedings of the 2007 ACM CoNEXT conference","author":"M. Becchi","year":"2007","unstructured":"Becchi, M., Crowley, P.: A hybrid finite automaton for practical deep packet inspection. In: CoNEXT 2007: Proceedings of the 2007 ACM CoNEXT conference, pp. 1\u201312. ACM, New York (2007)"},{"key":"14_CR5","unstructured":"Berk, E., Ananian, C.: Jlex: A lexical analyzer generator for java, http:\/\/www.cs.princeton.edu\/~appel\/modern\/java\/JLex\/"},{"issue":"1","key":"14_CR6","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1016\/0304-3975(86)90088-5","volume":"48","author":"G. Berry","year":"1986","unstructured":"Berry, G., Sethi, R.: From regular expressions to deterministic automata. Theor. Comput. Sci.\u00a048(1), 117\u2013126 (1986)","journal-title":"Theor. Comput. Sci."},{"key":"14_CR7","doi-asserted-by":"crossref","unstructured":"Clark, C.R., Schimmel, D.E.: Efficient reconfigurable logic circuits for matching complex network intrusion detection patterns, pp. 956\u2013959 (2003)","DOI":"10.1007\/978-3-540-45234-8_94"},{"key":"14_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"334","DOI":"10.1007\/978-3-540-30574-3_23","volume-title":"Topics in Cryptology \u2013 CT-RSA 2005","author":"D.L. Cook","year":"2005","unstructured":"Cook, D.L., Ioannidis, J., Keromytis, A.D., Luck, J.: Cryptographics: Secret key cryptography using graphics cards. In: Menezes, A. (ed.) CT-RSA 2005. LNCS, vol.\u00a03376, pp. 334\u2013350. Springer, Heidelberg (2005)"},{"issue":"3","key":"14_CR9","doi-asserted-by":"publisher","first-page":"603","DOI":"10.1145\/322326.322327","volume":"29","author":"R.W. Floyd","year":"1982","unstructured":"Floyd, R.W., Ullman, J.D.: The compilation of regular expressions into integrated circuits. J. ACM\u00a029(3), 603\u2013622 (1982)","journal-title":"J. ACM"},{"key":"14_CR10","unstructured":"Goyal, N., Ormont, J., Smith, R., Sankaralingam, K., Estan, C.: Signature matching in network processing using SIMD\/GPU architectures. Technical Report TR1628 (2008)"},{"key":"14_CR11","unstructured":"Harrison, O., Waldron, J.: Practical symmetric key cryptography on modern graphics hardware. In: Proceedings of the 17th USENIX Security Symposium, Berkeley, CA, USA, July 2008, pp. 195\u2013209. USENIX Association (2008)"},{"key":"14_CR12","volume-title":"Introduction To Automata Theory, Languages, And Computation","author":"J.E. Hopcroft","year":"1990","unstructured":"Hopcroft, J.E., Ullman, J.D.: Introduction To Automata Theory, Languages, And Computation. Addison-Wesley Longman Publishing Co., Inc., Boston (1990)"},{"key":"14_CR13","doi-asserted-by":"crossref","unstructured":"Huang, N.-F., Hung, H.-W., Lai, S.-H., Chu, Y.-M., Tsai, W.-Y.: A gpu-based multiple-pattern matching algorithm for network intrusion detection systems. In: Proceedings of the 22nd International Conference on Advanced Information Networking and Applications (AINA), pp. 62\u201367","DOI":"10.1109\/WAINA.2008.145"},{"key":"14_CR14","doi-asserted-by":"crossref","unstructured":"Jacob, N., Brodley, C.: Offloading IDS computation to the GPU. In: Proceedings of the 22nd Annual Computer Security Applications Conference on Annual Computer Security Applications Conference (ACSAC 2006), Washington, DC, USA, pp. 371\u2013380. IEEE Computer Society, Los Alamitos (2006)","DOI":"10.1109\/ACSAC.2006.35"},{"key":"14_CR15","first-page":"155","volume-title":"ANCS 2007: Proceedings of the 3rd ACM\/IEEE Symposium on Architecture for networking and communications systems","author":"S. Kumar","year":"2007","unstructured":"Kumar, S., Chandrasekaran, B., Turner, J., Varghese, G.: Curing regular expressions matching algorithms from insomnia, amnesia, and acalculia. In: ANCS 2007: Proceedings of the 3rd ACM\/IEEE Symposium on Architecture for networking and communications systems, pp. 155\u2013164. ACM, New York (2007)"},{"key":"14_CR16","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1145\/1159913.1159952","volume-title":"SIGCOMM 2006: Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications","author":"S. Kumar","year":"2006","unstructured":"Kumar, S., Dharmapurikar, S., Yu, F., Crowley, P., Turner, J.: Algorithms to accelerate multiple regular expressions matching for deep packet inspection. In: SIGCOMM 2006: Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications, pp. 339\u2013350. ACM, New York (2006)"},{"key":"14_CR17","first-page":"73","volume":"1","author":"G.G. Richard III","year":"2007","unstructured":"Richard III, G.G., Marziale, L., Roussev, V.: Massive threading: Using GPUs to increase the performance of digital forensics tools. Digital Investigation\u00a01, 73\u201381 (2007)","journal-title":"Digital Investigation"},{"key":"14_CR18","doi-asserted-by":"crossref","unstructured":"Moscola, J., Lockwood, J., Loui, R.P., Pachos, M.: Implementation of a content-scanning module for an internet firewall. In: FCCM, pp. 31\u201338 (2003)","DOI":"10.1109\/FPGA.2003.1227239"},{"key":"14_CR19","unstructured":"NVIDIA. NVIDIA CUDA Compute Unified Device Architecture Programming Guide, version 1.1, http:\/\/developer.download.nvidia.com\/compute\/cuda\/1_1\/NVIDIA_CUDA_Programming_Guide_1.1.pdf"},{"key":"14_CR20","unstructured":"Paxson, V.: Bro: A system for detecting network intruders in real-time. In: Proceedings of the 7th conference on USENIX Security Symposium (SSYM 1998), Berkeley, CA, USA, p. 3. USENIX Association (1998)"},{"key":"14_CR21","unstructured":"Roesch, M.: Snort: Lightweight intrusion detection for networks. In: Proceedings of the 1999 USENIX LISA Systems Administration Conference (November 1999)"},{"key":"14_CR22","doi-asserted-by":"crossref","unstructured":"Rubin, S., Jha, S., Miller, B.: Protomatching Network Traffic for High Throughput Network Intrusion Detection. In: Proceedings of the 13th ACM conference on Computer and Communications Security (CCS), pp. 47\u201358","DOI":"10.1145\/1180405.1180413"},{"key":"14_CR23","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1145\/1366230.1366237","volume-title":"CF 2008: Proceedings of the 2008 conference on Computing frontiers","author":"D.P. Scarpazza","year":"2008","unstructured":"Scarpazza, D.P., Villa, O., Petrini, F.: Exact multi-pattern string matching on the cell\/b.e. processor. In: CF 2008: Proceedings of the 2008 conference on Computing frontiers, pp. 33\u201342. ACM, New York (2008)"},{"key":"14_CR24","unstructured":"Sidhu, R., Prasanna, V.: Fast regular expression matching using FPGAs. In: IEEE Symposium on Field-Programmable Custom Computing Machines, FCCM 2001 (2001)"},{"key":"14_CR25","doi-asserted-by":"crossref","unstructured":"Smith, R., Estan, C., Jha, S.: Backtracking algorithmic complexity attacks against a nids. In: ACSAC 2006: Proceedings of the 22nd Annual Computer Security Applications Conference on Annual Computer Security Applications Conference, Washington, DC, USA, pp. 89\u201398. IEEE Computer Society, Los Alamitos (2006)","DOI":"10.1109\/ACSAC.2006.17"},{"key":"14_CR26","first-page":"187","volume-title":"IEEE Symposium on Security and Privacy","author":"R. Smith","year":"2008","unstructured":"Smith, R., Estan, C., Jha, S.: Xfa: Faster signature matching with extended automata. In: IEEE Symposium on Security and Privacy, pp. 187\u2013201. IEEE Computer Society, Los Alamitos (2008)"},{"key":"14_CR27","doi-asserted-by":"crossref","unstructured":"Smith, R., Goyal, N., Ormont, J., Sankaralingam, K., Estan, C.: Evaluating GPUs for network packet signature matching. In: Proceedings of the International Symposium on Performance Analysis of Systems and Software, ISPASS (2009)","DOI":"10.1109\/ISPASS.2009.4919649"},{"key":"14_CR28","first-page":"262","volume-title":"CCS 2003: Proceedings of the 10th ACM conference on Computer and communications security","author":"R. Sommer","year":"2003","unstructured":"Sommer, R., Paxson, V.: Enhancing byte-level network intrusion detection signatures with context. In: CCS 2003: Proceedings of the 10th ACM conference on Computer and communications security, pp. 262\u2013271. ACM, New York (2003)"},{"issue":"6","key":"14_CR29","doi-asserted-by":"publisher","first-page":"419","DOI":"10.1145\/363347.363387","volume":"11","author":"K. Thompson","year":"1968","unstructured":"Thompson, K.: Programming techniques: Regular expression search algorithm. Commun. ACM\u00a011(6), 419\u2013422 (1968)","journal-title":"Commun. ACM"},{"key":"14_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1007\/978-3-540-87403-4_7","volume-title":"Recent Advances in Intrusion Detection","author":"G. Vasiliadis","year":"2008","unstructured":"Vasiliadis, G., Antonatos, S., Polychronakis, M., Markatos, E.P., Ioannidis, S.: Gnort: High performance network intrusion detection using graphics processors. In: Lippmann, R., Kirda, E., Trachtenberg, A. (eds.) RAID 2008. LNCS, vol.\u00a05230, pp. 116\u2013134. Springer, Heidelberg (2008)"},{"key":"14_CR31","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1145\/1185347.1185360","volume-title":"ANCS 2006: Proceedings of the 2006 ACM\/IEEE symposium on Architecture for networking and communications systems","author":"F. Yu","year":"2006","unstructured":"Yu, F., Chen, Z., Diao, Y., Lakshman, T.V., Katz, R.H.: Fast and memory-efficient regular expression matching for deep packet inspection. In: ANCS 2006: Proceedings of the 2006 ACM\/IEEE symposium on Architecture for networking and communications systems, pp. 93\u2013102. ACM, New York (2006)"}],"container-title":["Lecture Notes in Computer Science","Recent Advances in Intrusion Detection"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04342-0_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,12]],"date-time":"2025-02-12T11:48:03Z","timestamp":1739360883000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04342-0_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642043413","9783642043420"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04342-0_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009]]}}}