{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T18:57:36Z","timestamp":1772823456405,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":49,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,10,16]],"date-time":"2012-10-16T00:00:00Z","timestamp":1350345600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,10,16]]},"DOI":"10.1145\/2382196.2382232","type":"proceedings-article","created":{"date-parts":[[2012,10,15]],"date-time":"2012-10-15T17:13:12Z","timestamp":1350321192000},"page":"317-328","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":111,"title":["Kargus"],"prefix":"10.1145","author":[{"given":"Muhammad Asim","family":"Jamshed","sequence":"first","affiliation":[{"name":"KAIST, Daejeon, South Korea"}]},{"given":"Jihyung","family":"Lee","sequence":"additional","affiliation":[{"name":"KAIST, Daejeon, South Korea"}]},{"given":"Sangwoo","family":"Moon","sequence":"additional","affiliation":[{"name":"KAIST, Daejeon, South Korea"}]},{"given":"Insu","family":"Yun","sequence":"additional","affiliation":[{"name":"KAIST, Daejeon, South Korea"}]},{"given":"Deokjin","family":"Kim","sequence":"additional","affiliation":[{"name":"NSRI, Daejeon, South Korea"}]},{"given":"Sungryoul","family":"Lee","sequence":"additional","affiliation":[{"name":"NSRI, Daejeon, South Korea"}]},{"given":"Yung","family":"Yi","sequence":"additional","affiliation":[{"name":"KAIST, Daejeon, South Korea"}]},{"given":"KyoungSoo","family":"Park","sequence":"additional","affiliation":[{"name":"KAIST, Daejeon, South Korea"}]}],"member":"320","published-online":{"date-parts":[[2012,10,16]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Intelligent Networks Powered by Cavium Octeon and Nitrox Processors: IDS\/IPS Software Toolkit. http:\/\/www.cavium.com\/css_ids_ips_stk.html.  Intelligent Networks Powered by Cavium Octeon and Nitrox Processors: IDS\/IPS Software Toolkit. http:\/\/www.cavium.com\/css_ids_ips_stk.html."},{"key":"e_1_3_2_1_2_1","unstructured":"Libzero for DNA. http:\/\/www.ntop.org\/products\/pf_ring\/libzero-for-dna\/.  Libzero for DNA. http:\/\/www.ntop.org\/products\/pf_ring\/libzero-for-dna\/."},{"key":"e_1_3_2_1_3_1","unstructured":"McAfee Network Security Platform. http:\/\/www.mcafee.com\/us\/products\/network-security-platform.aspx.  McAfee Network Security Platform. http:\/\/www.mcafee.com\/us\/products\/network-security-platform.aspx."},{"key":"e_1_3_2_1_4_1","unstructured":"More about Suricata multithread performance. https:\/\/home.regit.org\/2011\/02\/more-about-suricata-multithread-performance\/.  More about Suricata multithread performance. https:\/\/home.regit.org\/2011\/02\/more-about-suricata-multithread-performance\/."},{"key":"e_1_3_2_1_5_1","unstructured":"Optimizing Suricata on multicore CPUs. http:\/\/home.regit.org\/?p=438.  Optimizing Suricata on multicore CPUs. http:\/\/home.regit.org\/?p=438."},{"key":"e_1_3_2_1_6_1","unstructured":"PCRE (Perl Compatible Regular Expressions). http:\/\/pcre.org.  PCRE (Perl Compatible Regular Expressions). http:\/\/pcre.org."},{"key":"e_1_3_2_1_7_1","unstructured":"Single Threaded Data Processing Pipelines and the Intel Architecture. http:\/\/vrt-blog.snort.org\/2010\/06\/single-threaded-data-processing.html.  Single Threaded Data Processing Pipelines and the Intel Architecture. http:\/\/vrt-blog.snort.org\/2010\/06\/single-threaded-data-processing.html."},{"key":"e_1_3_2_1_8_1","unstructured":"SnortSP (Security Platform). http:\/\/www.snort.org\/snort-downloads\/snortsp\/.  SnortSP (Security Platform). http:\/\/www.snort.org\/snort-downloads\/snortsp\/."},{"key":"e_1_3_2_1_9_1","unstructured":"Suricata Intrusion Detection System. http:\/\/www.openinfosecfoundation.org\/index.php\/download-suricata.  Suricata Intrusion Detection System. http:\/\/www.openinfosecfoundation.org\/index.php\/download-suricata."},{"key":"e_1_3_2_1_10_1","unstructured":"The Programming Language Lua. http:\/\/www.lua.org\/.  The Programming Language Lua. http:\/\/www.lua.org\/."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/360825.360855"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/968280.968312"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1364654.1364656"},{"key":"e_1_3_2_1_14_1","volume-title":"Proceedings of Parallel and Distributed Computing and Systems (PDCS)","author":"Chen X.","year":"2009","unstructured":"X. Chen , Y. Wu , L. Xu , Y. Xue , and J. Li . Para-Snort: A Multi-thread Snort on Multi-core IA Platform . In Proceedings of Parallel and Distributed Computing and Systems (PDCS) , 2009 . X. Chen, Y. Wu, L. Xu, Y. Xue, and J. Li. Para-Snort: A Multi-thread Snort on Multi-core IA Platform. In Proceedings of Parallel and Distributed Computing and Systems (PDCS), 2009."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065579.1065641"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/647929.740405"},{"key":"e_1_3_2_1_17_1","volume-title":"Proceedings of the Workshop on Network Processors and Applications (NP3)","author":"Clark C.","year":"2004","unstructured":"C. Clark , W. Lee , D. Schimmel , D. Contis , M. Kon\u00e9 , and A. Thomas . A Hardware Platform for Network Intrusion Detection and Prevention . In Proceedings of the Workshop on Network Processors and Applications (NP3) , 2004 . C. Clark, W. Lee, D. Schimmel, D. Contis, M. Kon\u00e9, and A. Thomas. A Hardware Platform for Network Intrusion Detection and Prevention. In Proceedings of the Workshop on Network Processors and Applications (NP3), 2004."},{"key":"e_1_3_2_1_18_1","volume-title":"Efficient Reconfigurable Logic Circuits for Matching Complex Network Intrusion Detection Patterns. In In Proceedings of 13th International Conference on Field Programmable Logic and Applications (FPL)","author":"Clark C. R.","year":"2003","unstructured":"C. R. Clark and D. E. Schimmel . Efficient Reconfigurable Logic Circuits for Matching Complex Network Intrusion Detection Patterns. In In Proceedings of 13th International Conference on Field Programmable Logic and Applications (FPL) , 2003 . C. R. Clark and D. E. Schimmel. Efficient Reconfigurable Logic Circuits for Matching Complex Network Intrusion Detection Patterns. In In Proceedings of 13th International Conference on Field Programmable Logic and Applications (FPL), 2003."},{"key":"e_1_3_2_1_19_1","volume-title":"Proceedings of the International System Administration and Network Engineering Conference (SANE)","author":"Deri L.","year":"2004","unstructured":"L. Deri . Improving Passive Packet Capture: Beyond Device Polling . In Proceedings of the International System Administration and Network Engineering Conference (SANE) , 2004 . L. Deri. Improving Passive Packet Capture: Beyond Device Polling. In Proceedings of the International System Administration and Network Engineering Conference (SANE), 2004."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629578"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-87403-4_7"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1851182.1851207"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/WAINA.2008.145"},{"key":"e_1_3_2_1_24_1","unstructured":"Intel Inc. Intel Xeon Processor X5680 Specifications. http:\/\/ark.intel.com\/products\/47916\/Intel-Xeon-Processor-X5680-(12M-Cache-3_33-GHz-6_40-GTs-Intel-QPI).  Intel Inc. Intel Xeon Processor X5680 Specifications. http:\/\/ark.intel.com\/products\/47916\/Intel-Xeon-Processor-X5680-(12M-Cache-3_33-GHz-6_40-GTs-Intel-QPI)."},{"key":"e_1_3_2_1_25_1","unstructured":"IPFW\n  : FreeBSD Handbook. http:\/\/www.freebsd.org\/doc\/en_US.ISO8859-1\/books\/handbook\/firewalls-ipfw.html.  IPFW: FreeBSD Handbook. http:\/\/www.freebsd.org\/doc\/en_US.ISO8859-1\/books\/handbook\/firewalls-ipfw.html."},{"key":"e_1_3_2_1_26_1","volume-title":"Proceedings of the 8th USENIX conference on Networked Systems Design and Implementation (NSDI)","author":"Jang K.","year":"2011","unstructured":"K. Jang , S. Han , S. Han , S. Moon , and K. Park . SSLShader: Cheap SSL Acceleration with Commodity Processors . In Proceedings of the 8th USENIX conference on Networked Systems Design and Implementation (NSDI) , 2011 . K. Jang, S. Han, S. Han, S. Moon, and K. Park. SSLShader: Cheap SSL Acceleration with Commodity Processors. In Proceedings of the 8th USENIX conference on Networked Systems Design and Implementation (NSDI), 2011."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/363347.363387"},{"key":"e_1_3_2_1_28_1","volume-title":"Proceedings of the IEEE Symposium on Security and Privacy (Oakland)","author":"Kruegel C.","year":"2002","unstructured":"C. Kruegel , F. Valeur , G. Vigna , and R. Kemmerer . Stateful Intrusion Detection for High-Speed Networks . In Proceedings of the IEEE Symposium on Security and Privacy (Oakland) , 2002 . C. Kruegel, F. Valeur, G. Vigna, and R. Kemmerer. Stateful Intrusion Detection for High-Speed Networks. In Proceedings of the IEEE Symposium on Security and Privacy (Oakland), 2002."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1244002.1244259"},{"key":"e_1_3_2_1_30_1","volume-title":"Proceedings of the USENIX Security Symposium","author":"Meiners C. R.","year":"2010","unstructured":"C. R. Meiners , J. Patel , E. Norige , E. Torng , and A. X. Liu . Fast Regular Expression Matching using Small TCAMs for Network Intrusion Detection and Prevention Systems . In Proceedings of the USENIX Security Symposium , 2010 . C. R. Meiners, J. Patel, E. Norige, E. Torng, and A. X. Liu. Fast Regular Expression Matching using Small TCAMs for Network Intrusion Detection and Prevention Systems. In Proceedings of the USENIX Security Symposium, 2010."},{"key":"e_1_3_2_1_31_1","volume-title":"WinHEC (White paper)","year":"2004","unstructured":"Microsoft. Scalable Networking: Eliminating the Receive Processing Bottleneck--Introducing RSS . In WinHEC (White paper) , 2004 . Microsoft. Scalable Networking: Eliminating the Receive Processing Bottleneck--Introducing RSS. In WinHEC (White paper), 2004."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1323548.1323571"},{"key":"e_1_3_2_1_33_1","unstructured":"M. Norton. Optimizing Pattern Matching for Intrusion Detection 2004. http:\/\/docs.idsresearch.org\/OptimizingPatternMatchingForIDS.pdf.  M. Norton. Optimizing Pattern Matching for Intrusion Detection 2004. http:\/\/docs.idsresearch.org\/OptimizingPatternMatchingForIDS.pdf."},{"key":"e_1_3_2_1_34_1","unstructured":"NVIDIA Inc. GeForce GTX 580 Specifications. http:\/\/www.geforce.com\/hardware\/desktop-gpus\/geforce-gtx-580\/specifications.  NVIDIA Inc. GeForce GTX 580 Specifications. http:\/\/www.geforce.com\/hardware\/desktop-gpus\/geforce-gtx-580\/specifications."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.14"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISPASS.2009.4919649"},{"key":"e_1_3_2_1_37_1","unstructured":"Ricciulli Livio and Covel Timothy. Inline Snort multiprocessing with PF_RING. http:\/\/www.snort.org\/assets\/186\/PF_RING_Snort_Inline_Instructions.pdf.  Ricciulli Livio and Covel Timothy. Inline Snort multiprocessing with PF_RING. http:\/\/www.snort.org\/assets\/186\/PF_RING_Snort_Inline_Instructions.pdf."},{"key":"e_1_3_2_1_38_1","volume-title":"Proceedings of the USENIX Annual Technical Conference","author":"Rizzo L.","year":"2012","unstructured":"L. Rizzo . netmap : A Novel Framework for Fast Packet I\/O . In Proceedings of the USENIX Annual Technical Conference , 2012 . L. Rizzo. netmap: A Novel Framework for Fast Packet I\/O. In Proceedings of the USENIX Annual Technical Conference, 2012."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/359842.359859"},{"key":"e_1_3_2_1_40_1","volume-title":"Snort - Lightweight Intrusion Detection for Networks. In Proceedings of the USENIX Systems Administration Conference (LISA)","author":"Roesch M.","year":"1999","unstructured":"M. Roesch . Snort - Lightweight Intrusion Detection for Networks. In Proceedings of the USENIX Systems Administration Conference (LISA) , 1999 . M. Roesch. Snort - Lightweight Intrusion Detection for Networks. In Proceedings of the USENIX Systems Administration Conference (LISA), 1999."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1159913.1159952"},{"key":"e_1_3_2_1_42_1","volume-title":"A Fast Algorithm for Multi-Pattern Searching. Technical report","author":"Wu San","year":"1994","unstructured":"San Wu , and Udi Manber . A Fast Algorithm for Multi-Pattern Searching. Technical report , 1994 . San Wu, and Udi Manber. A Fast Algorithm for Multi-Pattern Searching. Technical report, 1994."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1062261.1062314"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2005.5"},{"key":"e_1_3_2_1_45_1","unstructured":"TCPDUMP. http:\/\/www.tcpdump.org\/.  TCPDUMP. http:\/\/www.tcpdump.org\/."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.5555\/1776434.1776443"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046741"},{"key":"e_1_3_2_1_48_1","volume-title":"KAIST","author":"Woo S.","year":"2012","unstructured":"S. Woo and K. Park . Scalable TCP Session Monitoring with Symmetric Receive-side Scaling. Technical report , KAIST , 2012 . http:\/\/www.ndsl.kaist.edu\/~shinae\/papers\/TR-symRSS.pdf. S. Woo and K. Park. Scalable TCP Session Monitoring with Symmetric Receive-side Scaling. Technical report, KAIST, 2012. http:\/\/www.ndsl.kaist.edu\/~shinae\/papers\/TR-symRSS.pdf."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.5555\/1025124.1025890"}],"event":{"name":"CCS'12: the ACM Conference on Computer and Communications Security","location":"Raleigh North Carolina USA","acronym":"CCS'12","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2012 ACM conference on Computer and communications security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2382196.2382232","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2382196.2382232","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:34:47Z","timestamp":1750239287000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2382196.2382232"}},"subtitle":["a highly-scalable software-based intrusion detection system"],"short-title":[],"issued":{"date-parts":[[2012,10,16]]},"references-count":49,"alternative-id":["10.1145\/2382196.2382232","10.1145\/2382196"],"URL":"https:\/\/doi.org\/10.1145\/2382196.2382232","relation":{},"subject":[],"published":{"date-parts":[[2012,10,16]]},"assertion":[{"value":"2012-10-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}