{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T20:56:38Z","timestamp":1725656198986},"reference-count":40,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,10]]},"DOI":"10.1109\/iccd.2015.7357113","type":"proceedings-article","created":{"date-parts":[[2015,12,17]],"date-time":"2015-12-17T21:57:06Z","timestamp":1450389426000},"page":"266-272","source":"Crossref","is-referenced-by-count":6,"title":["Deep Packet Field Extraction Engine (DPFEE): A pre-processor for network intrusion detection and denial-of-service detection systems"],"prefix":"10.1109","author":[{"given":"Vinayaka","family":"Jyothi","sequence":"first","affiliation":[]},{"given":"Sateesh K.","family":"Addepalli","sequence":"additional","affiliation":[]},{"given":"Ramesh","family":"Karri","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","first-page":"81","article-title":"Grammar-based SIP parser implementation with performance optimizations","author":"stefanec","year":"2011","journal-title":"IEEE International Conference on Telecommunications"},{"year":"0","key":"ref38","article-title":"PJSIP - Open Source multimedia communication library"},{"key":"ref33","article-title":"Guidelines for the use of extensible markup language (XML) within IETF Protocols","author":"hollenbeck","year":"2003","journal-title":"RFC3470"},{"journal-title":"RFC 2616 Hypertext transfer protocol&#x2014 HTTP 1 1","article-title":"IETF","year":"0","key":"ref32"},{"journal-title":"SIP Session Initiation Protocol RFC 3261","article-title":"IETF","year":"0","key":"ref31"},{"year":"0","key":"ref30","article-title":"SNORT Preprocessor"},{"journal-title":"Open Source IDS High Performance Shootout","year":"0","author":"khalil","key":"ref37"},{"journal-title":"IETF RFC 2543 SIP Session Initiation Protocol","article-title":"IETF","year":"0","key":"ref36"},{"article-title":"FIX\/FIXML Implementation","year":"2001","author":"johnson","key":"ref35"},{"key":"ref34","article-title":"FIXML-A Markup Language for the FIX Application Message Layer","author":"cover","year":"1999","journal-title":"The XML Cover Pages"},{"journal-title":"5 Things You Need to Know About Deep Packet Inspection (DPI)","article-title":"Cavium","year":"0","key":"ref10"},{"year":"0","key":"ref40","article-title":"SIPp - Open Source test tool"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1007\/978-3-540-89054-6_6","article-title":"Secure SIP: A scalable prevention mechanism for dos attacks on sip based voip systems","author":"ormazabal","year":"2008","journal-title":"Principles Systems and Applications of IP Telecommunications Services and Security for Next Generation Networks"},{"key":"ref12","first-page":"1746","article-title":"Flow sifter: A counting automata approach to layer 7 field extraction for deep flow inspection","author":"meiners","year":"2012","journal-title":"IEEE INFOCOM"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ANCS.2011.12"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462139"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/DDECS.2009.5012106"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2396556.2396571"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/FPL.2006.311308"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/AERO.2007.352793"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/11663812_6"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/1723112.1723149"},{"journal-title":"Cyber Security on the Offense A Study of IT Security Experts","article-title":"Ponemon Institute","year":"0","key":"ref4"},{"article-title":"Flex: the fast lexical analyzer","year":"2012","author":"paxson","key":"ref27"},{"journal-title":"Q2 Key Findings from ATLAS","article-title":"Arbor Networks","year":"0","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICPADS.2011.37"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1007\/978-3-642-15512-3_4","article-title":"Improving NFA-based signature matching using ordered binary decision diagrams","author":"yang","year":"2010","journal-title":"Recent Advances in Intrusion Detection"},{"journal-title":"Accelerated Deep Packet Inspection for Network Security Applications","article-title":"Windriver Whitepaper","year":"0","key":"ref5"},{"article-title":"A survey on deep packet inspection for intrusion detection systems","year":"2008","author":"abuhmed","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40552-5_13"},{"journal-title":"Q2 2013 saw 1000% increases in average DDoS attack bandwidth and packet-per-second rates","article-title":"Prolexic","year":"0","key":"ref2"},{"key":"ref9","first-page":"267","article-title":"A Survey on Parallel and Distributed Techniques for Improving the Performance of Signature-Based Network Intrusion Detection Systems","author":"shiri","year":"2013","journal-title":"Australian Journal of Basic and Applied Sciences"},{"journal-title":"Q4 2013 Global DDoS Attack Trends","article-title":"Prolexic","year":"0","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1002\/bltj.20048"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1269899.1254924"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73530-4_13"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2009.09.004"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2007.525"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/1185347.1185360"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICET.2014.7021022"}],"event":{"name":"2015 33rd IEEE International Conference on Computer Design (ICCD)","start":{"date-parts":[[2015,10,18]]},"location":"New York City, NY, USA","end":{"date-parts":[[2015,10,21]]}},"container-title":["2015 33rd IEEE International Conference on Computer Design (ICCD)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7347055\/7357071\/07357113.pdf?arnumber=7357113","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T14:16:21Z","timestamp":1602684981000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7357113"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10]]},"references-count":40,"URL":"https:\/\/doi.org\/10.1109\/iccd.2015.7357113","relation":{},"subject":[],"published":{"date-parts":[[2015,10]]}}}