{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:10:19Z","timestamp":1763467819410,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2007,10,28]],"date-time":"2007-10-28T00:00:00Z","timestamp":1193529600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2007,10,28]]},"DOI":"10.1145\/1315245.1315264","type":"proceedings-article","created":{"date-parts":[[2007,11,15]],"date-time":"2007-11-15T14:30:20Z","timestamp":1195137020000},"page":"139-149","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":36,"title":["Shunting"],"prefix":"10.1145","author":[{"given":"Jose M.","family":"Gonzalez","sequence":"first","affiliation":[{"name":"International Computer Science Institute, Berkeley, CA"}]},{"given":"Vern","family":"Paxson","sequence":"additional","affiliation":[{"name":"International Computer Science Institute, Berkeley, CA"}]},{"given":"Nicholas","family":"Weaver","sequence":"additional","affiliation":[{"name":"International Computer Science Institute, Berkeley, CA"}]}],"member":"320","published-online":{"date-parts":[[2007,10,28]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_3_2_1_1_1","DOI":"10.1145\/362686.362692"},{"key":"e_1_3_2_1_2_1","volume-title":"Proceedings of The 3rd Workshop on Network Processors and Applications (NP3)","author":"Clark C.","year":"2004","unstructured":"C. Clark , W. Lee , D. Schimmel , D. Contis , M. Kone , and A. Thomas . A hardware platform for network intrusion detection and prevention . In Proceedings of The 3rd Workshop on Network Processors and Applications (NP3) , 2004 . C. Clark, W. Lee, D. Schimmel, D. Contis, M. Kone, and A. Thomas. A hardware platform for network intrusion detection and prevention. In Proceedings of The 3rd Workshop on Network Processors and Applications (NP3), 2004."},{"key":"e_1_3_2_1_3_1","volume-title":"Proceedings of the Passive and Active Measurement Conference","author":"Cleary J.","year":"2000","unstructured":"J. Cleary , S. Donnelly , I. Graham , A. McGregor , and M. Pearson . Design principles for accurate passive measurement . In Proceedings of the Passive and Active Measurement Conference , 2000 . J. Cleary, S. Donnelly, I. Graham, A. McGregor, and M. Pearson. Design principles for accurate passive measurement. In Proceedings of the Passive and Active Measurement Conference, 2000."},{"key":"e_1_3_2_1_4_1","volume-title":"Proceedings of E2EMON Workshop","author":"Coppens J.","year":"2003","unstructured":"J. Coppens , S. Van den Berghe, H. Bos, E. Markatos, F. De Turck, A. Oslebo, and S. Ubik. Scampi - a scaleable and programmable architecture for monitoring gigabit networks . In Proceedings of E2EMON Workshop , September 2003 . J. Coppens, S. Van den Berghe, H. Bos, E. Markatos, F. De Turck, A. Oslebo, and S. Ubik. Scampi - a scaleable and programmable architecture for monitoring gigabit networks. In Proceedings of E2EMON Workshop, September 2003."},{"key":"e_1_3_2_1_5_1","volume-title":"Proceedings of the 2nd International Workshop on Inter-Domain Performance and Simulation (IPS 2004)","author":"Coppens J.","year":"2004","unstructured":"J. Coppens , E. P. Markatos , J. Novotny , M. Polychronakis , V. Smotlacha , and S. Ubik . Scampi - a scaleable monitoring platform for the internet . In Proceedings of the 2nd International Workshop on Inter-Domain Performance and Simulation (IPS 2004) , March 2004 . J. Coppens, E. P. Markatos, J. Novotny, M. Polychronakis, V. Smotlacha, and S. Ubik. Scampi - a scaleable monitoring platform for the internet. In Proceedings of the 2nd International Workshop on Inter-Domain Performance and Simulation (IPS 2004), March 2004."},{"key":"e_1_3_2_1_6_1","first-page":"29","volume-title":"Proceedings of the 12th USENIX Security Symposium","author":"Crosby S.","year":"2003","unstructured":"S. Crosby and D. Wallach . Denial of service via algorithmic complexity attacks . In Proceedings of the 12th USENIX Security Symposium , pages 29 -- 44 , Aug 2003 . S. Crosby and D. Wallach. Denial of service via algorithmic complexity attacks. In Proceedings of the 12th USENIX Security Symposium, pages 29--44, Aug 2003."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_7_1","DOI":"10.5555\/646382.689691"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.1145\/233008.233038"},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings of the Passive and Active Measurement Conference","author":"Deri L.","year":"2003","unstructured":"L. Deri . Passively monitoring networks at gigabit speeds using commodity hardware and open source software . In Proceedings of the Passive and Active Measurement Conference , 2003 . L. Deri. Passively monitoring networks at gigabit speeds using commodity hardware and open source software. In Proceedings of the Passive and Active Measurement Conference, 2003."},{"key":"e_1_3_2_1_10_1","volume-title":"Proceedings of the USENIX Security Symposium","author":"Dreger H.","year":"2006","unstructured":"H. Dreger , A. Feldmann , M. Mai , V. Paxson , and R. Sommer . Dynamic application-layer protocol analysis for network intrusion detection . In Proceedings of the USENIX Security Symposium , 2006 . H. Dreger, A. Feldmann, M. Mai, V. Paxson, and R. Sommer. Dynamic application-layer protocol analysis for network intrusion detection. In Proceedings of the USENIX Security Symposium, 2006."},{"key":"e_1_3_2_1_11_1","volume-title":"Proceedings of the 9th USENIX Security Symposium","author":"Handley M.","year":"2001","unstructured":"M. Handley , C. Kreibich , and V. Paxson . Network intrusion detection: Evasion, traffic normalization, end end-to-end protocol semantics . In Proceedings of the 9th USENIX Security Symposium , 2001 . M. Handley, C. Kreibich, and V. Paxson. Network intrusion detection: Evasion, traffic normalization, end end-to-end protocol semantics. In Proceedings of the 9th USENIX Security Symposium, 2001."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_12_1","DOI":"10.1145\/505202.505235"},{"volume-title":"Extending intelligence in the network","year":"2005","unstructured":"Intel. Intel(r) network infrastructure processors : Extending intelligence in the network , 2005 . Intel. Intel(r) network infrastructure processors: Extending intelligence in the network, 2005.","key":"e_1_3_2_1_13_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_14_1","DOI":"10.5555\/1251086.1251109"},{"key":"e_1_3_2_1_15_1","first-page":"285","volume-title":"Proceedings of the IEEE Symposium on Security and Privacy","author":"Kruegel C.","year":"2002","unstructured":"C. Kruegel , F. Valeur , G. Vigna , and R. Kemmerer . Stateful intrusion detection for high-speed networks . In Proceedings of the IEEE Symposium on Security and Privacy , pages 285 -- 294 , May 2002 . C. Kruegel, F. Valeur, G. Vigna, and R. Kemmerer. Stateful intrusion detection for high-speed networks. In Proceedings of the IEEE Symposium on Security and Privacy, pages 285--294, May 2002."},{"unstructured":"E. Markatos. Scampi detailed architecture design. http:\/\/www.ist-scampi.org\/publications\/deliverables\/D1.3.pdf 2005.  E. Markatos. Scampi detailed architecture design. http:\/\/www.ist-scampi.org\/publications\/deliverables\/D1.3.pdf 2005.","key":"e_1_3_2_1_16_1"},{"unstructured":"N. McKeown and G. Watson. Netfpga 2.0 http:\/\/klamath.stanford.edu\/nf2\/.  N. McKeown and G. Watson. Netfpga 2.0 http:\/\/klamath.stanford.edu\/nf2\/.","key":"e_1_3_2_1_17_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_18_1","DOI":"10.1145\/1028788.1028794"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_19_1","DOI":"10.1109\/90.330413"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_20_1","DOI":"10.1016\/S1389-1286(99)00112-7"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_21_1","DOI":"10.1109\/90.392383"},{"key":"e_1_3_2_1_22_1","volume-title":"Calgary","author":"Ptacek T. H.","year":"1998","unstructured":"T. H. Ptacek and T. N. Newsham . Insertion, evasion, and denial of service: Eluding network intrusion detection. Technical report, Secure Networks, Inc ., Calgary , Alberta, Canada , 1998 . T. H. Ptacek and T. N. Newsham. Insertion, evasion, and denial of service: Eluding network intrusion detection. Technical report, Secure Networks, Inc., Calgary, Alberta, Canada, 1998."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_23_1","DOI":"10.1145\/165123.165152"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_24_1","DOI":"10.1145\/948109.948145"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_25_1","DOI":"10.1145\/1080091.1080114"},{"unstructured":"M. Vallentin R. Sommer J. Lee C. Leres V. Paxson and B. Tierney. The NIDS cluster: Scalable stateful network intrusion detection on commodity hardware. In RAID 2007 (to appear).   M. Vallentin R. Sommer J. Lee C. Leres V. Paxson and B. Tierney. The NIDS cluster: Scalable stateful network intrusion detection on commodity hardware. In RAID 2007 (to appear).","key":"e_1_3_2_1_26_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_27_1","DOI":"10.1145\/1216919.1216952"},{"key":"e_1_3_2_1_28_1","volume-title":"Self-similarity and heavy tails: Structural modeling of network traffic","author":"Wilinger W.","year":"1998","unstructured":"W. Wilinger , V. Paxson , and M. Taqqu . Self-similarity and heavy tails: Structural modeling of network traffic . In R. Adler, R. Feldman, and M. Taqqu, editors, A Practical Guide To Heavy Tails: Statistical Techniques and Techniques. Birkhauser , 1998 . W. Wilinger, V. Paxson, and M. Taqqu. Self-similarity and heavy tails: Structural modeling of network traffic. In R. Adler, R. Feldman, and M. Taqqu, editors, A Practical Guide To Heavy Tails: Statistical Techniques and Techniques. Birkhauser, 1998."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_29_1","DOI":"10.1109\/90.554723"}],"event":{"sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"],"acronym":"CCS07","name":"CCS07: 14th ACM Conference on Computer and Communications Security 2007","location":"Alexandria Virginia USA"},"container-title":["Proceedings of the 14th ACM conference on Computer and communications security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1315245.1315264","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1315245.1315264","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:56:12Z","timestamp":1750254972000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1315245.1315264"}},"subtitle":["a hardware\/software architecture for flexible, high-performance network intrusion prevention"],"short-title":[],"issued":{"date-parts":[[2007,10,28]]},"references-count":29,"alternative-id":["10.1145\/1315245.1315264","10.1145\/1315245"],"URL":"https:\/\/doi.org\/10.1145\/1315245.1315264","relation":{},"subject":[],"published":{"date-parts":[[2007,10,28]]},"assertion":[{"value":"2007-10-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}