{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T22:27:31Z","timestamp":1725575251281},"publisher-location":"Berlin, Heidelberg","reference-count":29,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642181771"},{"type":"electronic","value":"9783642181788"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-18178-8_20","type":"book-chapter","created":{"date-parts":[[2011,1,15]],"date-time":"2011-01-15T16:09:47Z","timestamp":1295107787000},"page":"226-240","source":"Crossref","is-referenced-by-count":1,"title":["Selective Regular Expression Matching"],"prefix":"10.1007","author":[{"given":"Natalia","family":"Stakhanova","sequence":"first","affiliation":[]},{"given":"Hanli","family":"Ren","sequence":"additional","affiliation":[]},{"given":"Ali A.","family":"Ghorbani","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"20_CR1","unstructured":"Markatos, E.P., Antonatos, S., Polychronakis, M., Anagnostakis, K.G.: Exclusion-based signature matching for intrusion detection. In: Proceedings of CCN, pp. 146\u2013152 (2002)"},{"key":"20_CR2","doi-asserted-by":"crossref","unstructured":"Sourdis, I., Dimopoulos, V., Pnevmatikatos, D., Vassiliadis, S.: Packet pre-filtering for network intrusion detection. In: Proceedings of ANCS, pp. 183\u2013192 (2006)","DOI":"10.1145\/1185347.1185372"},{"key":"20_CR3","first-page":"229","volume-title":"Proceedings of LISA","author":"M. Roesch","year":"1999","unstructured":"Roesch, M.: Snort - lightweight intrusion detection for networks. In: Proceedings of LISA, pp. 229\u2013238. USENIX Association, Berkeley (1999)"},{"key":"20_CR4","first-page":"3","volume-title":"Proceedings of SSYM","author":"V. Paxson","year":"1998","unstructured":"Paxson, V.: Bro: a system for detecting network intruders in real-time. In: Proceedings of SSYM, p. 3. USENIX Association, Berkeley (1998)"},{"key":"20_CR5","unstructured":"Q1Labs. Qradar siem (2010), http:\/\/www.q1labs.com\/"},{"key":"20_CR6","unstructured":"TippingPoint. Intrusion prevention systems (2010), http:\/\/www.tippingpoint.com\/"},{"key":"20_CR7","doi-asserted-by":"crossref","unstructured":"Yu, F., Chen, Z., Diao, Y., Lakshman, T.V., Katz, R.H.: Fast and memory-efficient regular expression matching for deep packet inspection. In: Proceedings of ANCS, pp. 93\u2013102 (2006)","DOI":"10.1145\/1185347.1185360"},{"key":"20_CR8","unstructured":"Sidhu, R., Prasanna, V.K.: Fast Regular Expression Matching Using FPGAs. In: Proceedings of FCCM, pp. 227\u2013238 (2001)"},{"key":"20_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1007\/978-3-540-89862-7_15","volume-title":"Information Systems Security","author":"R. Smith","year":"2008","unstructured":"Smith, R., Estan, C., Jha, S., Siahaan, I.: Fast Signature Matching Using Extended Finite Automaton (XFA). In: Sekar, R., Pujari, A.K. (eds.) ICISS 2008. LNCS, vol.\u00a05352, pp. 158\u2013172. Springer, Heidelberg (2008)"},{"key":"20_CR10","doi-asserted-by":"crossref","unstructured":"Becchi, M., Crowley, P.: Efficient regular expression evaluation: theory to practice. In: Proceedings of ANCS, pp. 50\u201359 (2008)","DOI":"10.1145\/1477942.1477950"},{"key":"20_CR11","doi-asserted-by":"crossref","unstructured":"Becchi, M., Crowley, P.: A hybrid finite automaton for practical deep packet inspection. In: Proceedings of CoNEXT, pp. 1\u201312 (2007)","DOI":"10.1145\/1364654.1364656"},{"key":"20_CR12","doi-asserted-by":"crossref","unstructured":"Luchaup, D., Smith, R., Estan, C., Jha, S.: Multi-byte regular expression matching with speculation. In: Proceedings of RAID (2009)","DOI":"10.1007\/978-3-642-04342-0_15"},{"key":"20_CR13","volume-title":"Introduction to Automata Theory, Languages and Computation","author":"J.E. Hopcroft","year":"2007","unstructured":"Hopcroft, J.E., Motwani, R., Ullman, J.D.: Introduction to Automata Theory, Languages and Computation, 3rd edn. Pearson Addison-Wesley, Upper Saddle River (2007)","edition":"3"},{"key":"20_CR14","first-page":"111","volume-title":"Proceedings of FCCM","author":"B.L. Hutchings","year":"2002","unstructured":"Hutchings, B.L., Franklin, R., Carver, D.: Assisting network intrusion detection with reconfigurable hardware. In: Proceedings of FCCM, Washington, DC, USA, p. 111. IEEE Computer Society, Los Alamitos (2002)"},{"issue":"12","key":"20_CR15","doi-asserted-by":"publisher","first-page":"1303","DOI":"10.1109\/TVLSI.2007.909801","volume":"15","author":"C.H. Lin","year":"2007","unstructured":"Lin, C.H., Huang, C.T., Jiang, C.P., Chang, S.C.: Optimization of pattern matching circuits for regular expression on FPGA. IEEE Trans. Very Large Scale Integr. Syst.\u00a015(12), 1303\u20131310 (2007)","journal-title":"IEEE Trans. Very Large Scale Integr. Syst."},{"key":"20_CR16","first-page":"1535","volume-title":"Proceedings of SAC","author":"C.-T.D. Lo","year":"2008","unstructured":"Lo, C.-T.D., Tai, Y.-G., Psarris, K.: Hardware implementation for network intrusion detection rules with regular expression support. In: Proceedings of SAC, pp. 1535\u20131539. ACM, New York (2008)"},{"issue":"4","key":"20_CR17","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1145\/1402946.1402983","volume":"38","author":"R. Smith","year":"2008","unstructured":"Smith, R., Estan, C., Jha, S., Kong, S.: Deflating the big bang: fast and scalable deep packet inspection with extended finite automata. SIGCOMM Comput. Commun. Rev.\u00a038(4), 207\u2013218 (2008)","journal-title":"SIGCOMM Comput. Commun. Rev."},{"key":"20_CR18","first-page":"155","volume-title":"Proceedings of ANCS","author":"S. Kumar","year":"2007","unstructured":"Kumar, S., Chandrasekaran, B., Turner, J., Varghese, G.: Curing regular expressions matching algorithms from insomnia, amnesia, and acalculia. In: Proceedings of ANCS, pp. 155\u2013164. ACM, New York (2007)"},{"key":"20_CR19","first-page":"187","volume-title":"Proceedings of IEEE S& P","author":"R. Smith","year":"2008","unstructured":"Smith, R., Estan, C., Jha, S.: Xfa: Faster signature matching with extended automata. In: Proceedings of IEEE S& P, Washington, DC, USA, pp. 187\u2013201. IEEE Computer Society, Los Alamitos (2008)"},{"key":"20_CR20","volume-title":"Proceedings of IEEE Infocom","author":"M. Becchi","year":"2007","unstructured":"Becchi, M., Cadambi, S.: Memory-efficient regular expression search using state merging. In: Proceedings of IEEE Infocom, Anchorage, AK. ACM, New York (May 2007)"},{"key":"20_CR21","first-page":"339","volume-title":"Proceedings of SIGCOMM","author":"S. Kumar","year":"2006","unstructured":"Kumar, S., Dharmapurikar, S., Yu, F., Crowley, P., Turner, J.: Algorithms to accelerate multiple regular expressions matching for deep packet inspection. In: Proceedings of SIGCOMM, pp. 339\u2013350. ACM, New York (2006)"},{"key":"20_CR22","first-page":"93","volume-title":"Proceedings of ANCS","author":"F. Yu","year":"2006","unstructured":"Yu, F., Chen, Z., Diao, Y., Lakshman, T.V., Katz, R.H.: Fast and memory-efficient regular expression matching for deep packet inspection. In: Proceedings of ANCS, pp. 93\u2013102. ACM, New York (2006)"},{"key":"20_CR23","doi-asserted-by":"crossref","unstructured":"Sommer, R., Paxson, V.: Enhancing byte-level network intrusion detection signatures with context. In: Proceedings of CCS, pp. 262\u2013271 (2003)","DOI":"10.1145\/948109.948145"},{"key":"20_CR24","first-page":"173","volume-title":"Proceedings of ICDT","author":"T.J. Green","year":"2002","unstructured":"Green, T.J., Miklau, G., Onizuka, M., Suciu, D.: Processing XML streams with deterministic automata. In: Proceedings of ICDT, London, UK, pp. 173\u2013189. Springer, Heidelberg (2002)"},{"key":"20_CR25","unstructured":"Snort. Sourcefire Vulnerability Research Team $^{\\it TM}$ (VRT) Rules (2009), http:\/\/www.snort.org\/assets\/82\/snort_manual.pdf"},{"key":"20_CR26","first-page":"29","volume-title":"Proceedings of EUROSEC","author":"N. Stakhanova","year":"2010","unstructured":"Stakhanova, N., Ghorbani, A.A.: Managing intrusion detection rule sets. In: Proceedings of EUROSEC, pp. 29\u201335. ACM, New York (2010)"},{"issue":"4","key":"20_CR27","doi-asserted-by":"publisher","first-page":"618","DOI":"10.2307\/2271828","volume":"40","author":"R.V. Book","year":"1975","unstructured":"Book, R.V., Karp, R.M., Miller, R.E., Thatcher, J.W.: Reducibility among combinatorial problems. The Journal of Symbolic Logic\u00a040(4), 618+ (1975)","journal-title":"The Journal of Symbolic Logic"},{"key":"20_CR28","volume-title":"Introduction to Algorithms","author":"T.H. Cormen","year":"2001","unstructured":"Cormen, T.H., Leiserson, C.E., Rivest, R.L., Stein, C.: Introduction to Algorithms. MIT Press, Cambridge (2001)"},{"key":"20_CR29","doi-asserted-by":"crossref","first-page":"100","DOI":"10.1145\/780542.780558","volume-title":"Proceedings of STOC","author":"N. Alon","year":"2003","unstructured":"Alon, N., Awerbuch, B., Azar, Y.: The online set cover problem. In: Proceedings of STOC, pp. 100\u2013105. ACM, New York (2003)"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-18178-8_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,4]],"date-time":"2023-06-04T21:56:05Z","timestamp":1685915765000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-18178-8_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642181771","9783642181788"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-18178-8_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}