Logical Circuits for Extended Content Matching in Hardware Based NIDPS
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2013, Vol 7, Issue 3
Abstract
In this paper we present logical circuits for efficient detection of rolled out contents. As network speed increases and security matters there is a demand for implementation of hardware based Network Intrusion Detection and Prevention Systems (NIDPS). On the other hand hardware based NIDPS are lacking the flexibility of detection of so named "evasion" techniques. Here we present simple but efficient enhancement to content matching in hardware with minimal basic memory elements (flip-flops) used.
Authors and Affiliations
Dejan Georgiev, Aristotel Tentov
A Novel LAS-Relief Feature Selection Algorithm for Enhancing Classification Accuracy in Data mining
Feature selection is an important task in data mining and machine learning domain. The main objective of feature selection is to find a relevant feature that predicts the knowledge better than the original set of feature...
Characters Strings are Extracted Exhibit Morphology Method of an Image
In understanding an image, extraction of characters existing in the image is considered to be important. Scene images are different from document images, which are composed of characters and complicated background i.e. p...
Improving Efficiency of META Algorithm Using Record Reduction
Erasable Itemset Mining is the key approach of data mining in production planning. The erasable itemset mining is the process of finding erasable itemsets that satisfy the constraint i.e. user defined threshold. Efficien...
Biomedical Technology: The transforming paradigm of Healthcare Industry with its impact on Patient Monitoring System
Telehealth technology, which leverages wireless andenterprise networking, is changing the model of how we thinkabout going to the doctor. The ability to automatically andaccurately capture and record patient data from bi...
Remove the black-hole attack in mobile ADHOC network using Threshold Based Technique
In this paper enhanced the AODV routing protocol for the prevention of black hole attack. The enhanced AODV routing protocol based on the principle of thresholding. The thresholding using the concept of reference node se...