{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,30]],"date-time":"2025-05-30T21:04:05Z","timestamp":1748639045569,"version":"3.28.0"},"reference-count":33,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,8]]},"DOI":"10.1109\/iwcmc.2014.6906470","type":"proceedings-article","created":{"date-parts":[[2014,9,30]],"date-time":"2014-09-30T14:59:25Z","timestamp":1412089165000},"page":"869-874","source":"Crossref","is-referenced-by-count":10,"title":["Accelerating snort NIDS using NetFPGA-based Bloom filter"],"prefix":"10.1109","author":[{"given":"Rami","family":"Al-Dalky","sequence":"first","affiliation":[]},{"given":"Khaled","family":"Salah","sequence":"additional","affiliation":[]},{"given":"Hadi","family":"Otrok","sequence":"additional","affiliation":[]},{"given":"Mahmoud","family":"Al-Qutayri","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-87403-4_7","article-title":"Gnort: High performance network intrusion detection using graphics processors","author":"vasiliadis","year":"2008","journal-title":"Proc of Recent Advances in Intrusion Detection (RAID)"},{"journal-title":"Network Intrusion Detection system-A case study through snort","year":"0","author":"huang","key":"17"},{"key":"18","first-page":"1605","article-title":"Performance evaluation of Snort under Windows 7 and Windows Server 2008","author":"salah","year":"2011","journal-title":"Journal of Universal Computer Science"},{"journal-title":"D-ITG","year":"0","key":"33"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2009.5339695"},{"journal-title":"SNORT","year":"0","key":"16"},{"key":"13","article-title":"NetFPGA-based precise traffic generation","author":"salmon","year":"2009","journal-title":"NetFPGA Developers Workshop"},{"key":"14","first-page":"1","article-title":"Fast Filter Updates for Packet Classification using TCAM","author":"haoyu","year":"2006","journal-title":"GLOBECOM '06"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2013.05.004"},{"key":"12","article-title":"HATS: High accuracy time stamping system based on NetFPGA","author":"zhou","year":"0","journal-title":"Proceedings of the 2010 International Conference on Advances in Computer Science and Information Technology"},{"journal-title":"Parrallelizing A Network Intrusion Detection System Using A GPU","year":"2012","author":"sathik","key":"21"},{"key":"20","article-title":"Experiences with string matching on the fermi architecture","author":"tumeo","year":"2011","journal-title":"Proc of Int Conf on Architecture of Computing Systems ARCS"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/HPCC.2012.235"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2012.254"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.4304\/jnw.7.9.1327-1333"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1145\/1323548.1323571"},{"key":"26","article-title":"Deterministic finite automata for pattern matching in fpga for intrusion detection","author":"babu karuppiah","year":"2011","journal-title":"International Conference on Computer and Electrical Technoogy-ICCCET 18th &19th March"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/ECTICon.2012.6254301"},{"journal-title":"Hardware Acceleration for Power Efficient Deep Packet Inspection","year":"2012","author":"zhou","key":"28"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382312"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2004.842232"},{"key":"2","article-title":"Snort-lightweight intrusion detection for networks","author":"roesch","year":"1999","journal-title":"Proc USENIX LISA"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/DSD.2011.41"},{"key":"1","article-title":"NIST special publication on intrusion detection system","author":"bace","year":"2001","journal-title":"Tech Rep NIST (National Institute of Standards and Technology) Special Publication 800-31"},{"key":"30","article-title":"Bloom filter applications in network security: A state-of-The-Art survey","author":"shahabeddin","year":"2013","journal-title":"Computer Networks"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/1397718.1397720"},{"journal-title":"NetFPGA","year":"0","key":"6"},{"journal-title":"Network Tap","year":"0","key":"32"},{"key":"5","article-title":"Efficient multi-match packet classification and lookup with TCAM","author":"yu","year":"2004","journal-title":"IEEE Symposium on High Performance Interconnects (HotI) Stanford CA Aug"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1007\/s00422-012-0494-6"},{"key":"4","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1023\/A:1011140512041","article-title":"A high speed reconfigurable firewall based on parameterizable FPGA-based content addressable memories","volume":"19","author":"mcewan","year":"2001","journal-title":"The Journal of Supercomputing"},{"key":"9","article-title":"URL extraction on the NetFPGA reference router","author":"ciesla","year":"2009","journal-title":"NetFPGA Developers Workshop"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/1477942.1477944"}],"event":{"name":"2014 International Wireless Communications and Mobile Computing Conference (IWCMC)","start":{"date-parts":[[2014,8,4]]},"location":"Nicosia, Cyprus","end":{"date-parts":[[2014,8,8]]}},"container-title":["2014 International Wireless Communications and Mobile Computing Conference (IWCMC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6895209\/6906315\/06906470.pdf?arnumber=6906470","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T16:01:09Z","timestamp":1602691269000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6906470"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,8]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/iwcmc.2014.6906470","relation":{},"subject":[],"published":{"date-parts":[[2014,8]]}}}