{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T20:22:32Z","timestamp":1771705352295,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":52,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,10,17]],"date-time":"2011-10-17T00:00:00Z","timestamp":1318809600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,10,17]]},"DOI":"10.1145\/2046707.2046741","type":"proceedings-article","created":{"date-parts":[[2011,10,18]],"date-time":"2011-10-18T13:02:00Z","timestamp":1318942920000},"page":"297-308","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":93,"title":["MIDeA"],"prefix":"10.1145","author":[{"given":"Giorgos","family":"Vasiliadis","sequence":"first","affiliation":[{"name":"Foundation for Research and Technology - Hellas , Heraklion, Greece"}]},{"given":"Michalis","family":"Polychronakis","sequence":"additional","affiliation":[{"name":"Columbia University , New York, NY, USA"}]},{"given":"Sotiris","family":"Ioannidis","sequence":"additional","affiliation":[{"name":"Foundation for Research and Technology - Hellas , Heraklion, Greece"}]}],"member":"320","published-online":{"date-parts":[[2011,10,17]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Endace Security Manager. http:\/\/www.endace.com\/endace-security-manager2.html.  Endace Security Manager. http:\/\/www.endace.com\/endace-security-manager2.html."},{"key":"e_1_3_2_1_2_1","unstructured":"Intel 82599EB 10 Gigabit Ethernet Controller. http:\/\/ark.intel.com\/Product.aspx?id=32207.  Intel 82599EB 10 Gigabit Ethernet Controller. http:\/\/ark.intel.com\/Product.aspx?id=32207."},{"key":"e_1_3_2_1_3_1","unstructured":"Receive side scaling on Intel Network Adapters. http:\/\/www.intel.com\/support\/network\/adapter\/pro100\/sb\/cs-027574.htm.  Receive side scaling on Intel Network Adapters. http:\/\/www.intel.com\/support\/network\/adapter\/pro100\/sb\/cs-027574.htm."},{"key":"e_1_3_2_1_4_1","unstructured":"Tcpreplay. http:\/\/tcpreplay.synfin.net\/.  Tcpreplay. http:\/\/tcpreplay.synfin.net\/."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/360825.360855"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/968280.968312"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1364654.1364656"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings of the 3rd Workshop on Network Processors and Applications (NP3)","author":"Clark C. R.","year":"2005","unstructured":"C. R. Clark , W. Lee , D. E. Schimmel , D. Contis , M. Kon\u00e9 , and A. Thomas . A Hardware Platform for Network Intrusion Detection and Prevention. In P. Crowley, M. A. Franklin, H. Hadimioglu, and P. Z. Onufryk, editors , Proceedings of the 3rd Workshop on Network Processors and Applications (NP3) , 2005 . C. R. Clark, W. Lee, D. E. Schimmel, D. Contis, M. Kon\u00e9, and A. Thomas. A Hardware Platform for Network Intrusion Detection and Prevention. In P. Crowley, M. A. Franklin, H. Hadimioglu, and P. Z. Onufryk, editors, Proceedings of the 3rd Workshop on Network Processors and Applications (NP3), 2005."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45234-8_94"},{"key":"e_1_3_2_1_11_1","volume-title":"Proceedings of 4th International System Administration and Network Engineering Conference (SANE)","author":"Deri L.","year":"2004","unstructured":"L. Deri . Improving Passive Packet Capture: Beyond Device Polling . In Proceedings of 4th International System Administration and Network Engineering Conference (SANE) , 2004 . L. Deri. Improving Passive Packet Capture: Beyond Device Polling. In Proceedings of 4th International System Administration and Network Engineering Conference (SANE), 2004."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2004.1268997"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629578"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89862-7_18"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879169"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315264"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1851182.1851207"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/WAINA.2008.145"},{"key":"e_1_3_2_1_19_1","volume-title":"Supra-linear Packet Processing Performance with Intel Multi-core Processors","author":"Intel Corporation","year":"2006","unstructured":"Intel Corporation . Supra-linear Packet Processing Performance with Intel Multi-core Processors , 2006 . Intel Corporation. Supra-linear Packet Processing Performance with Intel Multi-core Processors, 2006."},{"key":"e_1_3_2_1_20_1","volume-title":"Removing System Bottlenecks in Multi-threaded Applications","author":"Intel Corporation","year":"2008","unstructured":"Intel Corporation . Removing System Bottlenecks in Multi-threaded Applications , 2008 . Intel Corporation. Removing System Bottlenecks in Multi-threaded Applications, 2008."},{"key":"e_1_3_2_1_21_1","volume-title":"Proceedings of the 23rd IEEE Symposium on Security and Privacy (S&P)","author":"Kruegel C.","year":"2002","unstructured":"C. Kruegel , F. Valeur , G. Vigna , and R. Kemmerer . Stateful Intrusion Detection for High-Speed Networks . In Proceedings of the 23rd IEEE Symposium on Security and Privacy (S&P) , May 2002 . C. Kruegel, F. Valeur, G. Vigna, and R. Kemmerer. Stateful Intrusion Detection for High-Speed Networks. In Proceedings of the 23rd IEEE Symposium on Security and Privacy (S&P), May 2002."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1323548.1323574"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1159913.1159952"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1244002.1244259"},{"key":"e_1_3_2_1_25_1","volume-title":"Network Cards on Linux. In Proceedings of the 2009 Linux Symposium","author":"Leitao B. H.","year":"2009","unstructured":"B. H. Leitao . Tuning 10 Gb Network Cards on Linux. In Proceedings of the 2009 Linux Symposium , July 2009 . B. H. Leitao. Tuning 10Gb Network Cards on Linux. In Proceedings of the 2009 Linux Symposium, July 2009."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1015047.1015055"},{"key":"e_1_3_2_1_27_1","volume-title":"Proceedings of the 19th USENIX Security Symposium","author":"Meiners C. R.","year":"2010","unstructured":"C. R. Meiners , J. Patel , E. Norige , E. Torng , and A. X. Liu . Fast Regular Expression Matching Using Small TCAMs for Network Intrusion Detection and Prevention Systems . In Proceedings of the 19th USENIX Security Symposium , 2010 . C. R. Meiners, J. Patel, E. Norige, E. Torng, and A. X. Liu. Fast Regular Expression Matching Using Small TCAMs for Network Intrusion Detection and Prevention Systems. In Proceedings of the 19th USENIX Security Symposium, 2010."},{"key":"e_1_3_2_1_28_1","volume-title":"Scalable Networking: Eliminating the Receive Processing Bottleneck - Introducing RSS","author":"Microsoft Corporation","year":"2005","unstructured":"Microsoft Corporation . Scalable Networking: Eliminating the Receive Processing Bottleneck - Introducing RSS , 2005 . Microsoft Corporation. Scalable Networking: Eliminating the Receive Processing Bottleneck - Introducing RSS, 2005."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1323548.1323571"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.5555\/938383.938394"},{"key":"e_1_3_2_1_31_1","volume-title":"July","author":"Norton M.","year":"2004","unstructured":"M. Norton . Optimizing Pattern Matching for Intrusion Detection , July 2004 . M. Norton. Optimizing Pattern Matching for Intrusion Detection, July 2004."},{"key":"e_1_3_2_1_32_1","unstructured":"NVIDIA. NVIDIA CUDA Programming Guide.  NVIDIA. NVIDIA CUDA Programming Guide."},{"key":"e_1_3_2_1_33_1","volume-title":"Bro: A System for Detecting Network Intruders in Real-time. In Proceedings of the 7th Conference on USENIX Security Symposium","author":"Paxson V.","year":"1998","unstructured":"V. Paxson . Bro: A System for Detecting Network Intruders in Real-time. In Proceedings of the 7th Conference on USENIX Security Symposium , 1998 . V. Paxson. Bro: A System for Detecting Network Intruders in Real-time. In Proceedings of the 7th Conference on USENIX Security Symposium, 1998."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.5555\/1268476.1268487"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/SARNOF.2007.4567341"},{"key":"e_1_3_2_1_36_1","volume-title":"Snort: Lightweight Intrusion Detection for Networks. In Proceedings of the 1999 USENIX Large Installation System Administration Conference (LISA)","author":"Roesch M.","year":"1999","unstructured":"M. Roesch . Snort: Lightweight Intrusion Detection for Networks. In Proceedings of the 1999 USENIX Large Installation System Administration Conference (LISA) , 1999 . M. Roesch. Snort: Lightweight Intrusion Detection for Networks. In Proceedings of the 1999 USENIX Large Installation System Administration Conference (LISA), 1999."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1366230.1366237"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1062261.1062314"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1229428.1229455"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.14"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISPASS.2009.4919649"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.25"},{"key":"e_1_3_2_1_43_1","volume-title":"Proceedings of the 15th International Conference on Field Programmable Logic and Applications (FPL)","author":"Song H.","year":"2005","unstructured":"H. Song , T. Sproull , M. Attig , and J. Lockwood . Snort Offloader: A Reconfigurable Hardware NIDS Filter . In Proceedings of the 15th International Conference on Field Programmable Logic and Applications (FPL) , 2005 . H. Song, T. Sproull, M. Attig, and J. Lockwood. Snort Offloader: A Reconfigurable Hardware NIDS Filter. In Proceedings of the 15th International Conference on Field Programmable Logic and Applications (FPL), 2005."},{"key":"e_1_3_2_1_44_1","unstructured":"Sourcefire. Sourcefire 3D System. http:\/\/www.sourcefire.com\/security-technologies\/cyber-security-products%\/3d-system.  Sourcefire. Sourcefire 3D System. http:\/\/www.sourcefire.com\/security-technologies\/cyber-security-products%\/3d-system."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.5555\/1025123.1025835"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2004.1354682"},{"key":"e_1_3_2_1_47_1","volume-title":"Stateful Network Intrusion Detection on Commodity Hardware. In Proceedings of the 10th International Symposium on Recent Advances in Intrusion Detection (RAID)","author":"Vallentin M.","year":"2007","unstructured":"M. Vallentin , R. Sommer , J. Lee , C. Leres , V. Paxson , and B. Tierney . The NIDS Cluster: Scalable , Stateful Network Intrusion Detection on Commodity Hardware. In Proceedings of the 10th International Symposium on Recent Advances in Intrusion Detection (RAID) , 2007 . M. Vallentin, R. Sommer, J. Lee, C. Leres, V. Paxson, and B. Tierney. The NIDS Cluster: Scalable, Stateful Network Intrusion Detection on Commodity Hardware. In Proceedings of the 10th International Symposium on Recent Advances in Intrusion Detection (RAID), 2007."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-87403-4_7"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04342-0_14"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2006.6"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/1185347.1185360"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.5555\/1025124.1025890"}],"event":{"name":"CCS'11: the ACM Conference on Computer and Communications Security","location":"Chicago Illinois USA","acronym":"CCS'11","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 18th ACM conference on Computer and communications security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2046707.2046741","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2046707.2046741","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:48:42Z","timestamp":1750240122000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2046707.2046741"}},"subtitle":["a multi-parallel intrusion detection architecture"],"short-title":[],"issued":{"date-parts":[[2011,10,17]]},"references-count":52,"alternative-id":["10.1145\/2046707.2046741","10.1145\/2046707"],"URL":"https:\/\/doi.org\/10.1145\/2046707.2046741","relation":{},"subject":[],"published":{"date-parts":[[2011,10,17]]},"assertion":[{"value":"2011-10-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}