Author image not provided
 Lucas John Vespa

Authors:
Add personal information
  Affiliation history
Bibliometrics: publication history
Average citations per article1.07
Citation Count16
Publication count15
Publication years2009-2016
Available for download3
Average downloads per article220.33
Downloads (cumulative)661
Downloads (12 Months)56
Downloads (6 Weeks)6
SEARCH
ROLE
Arrow RightAuthor only


AUTHOR'S COLLEAGUES
See all colleagues of this author

SUBJECT AREAS
See all subject areas




BOOKMARK & SHARE


15 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 15 of 15
Sort by:

1
February 2016 Journal of Parallel and Distributed Computing: Volume 88 Issue C, February 2016
Publisher: Academic Press, Inc.
Bibliometrics:
Citation Count: 0

The Graphics Processing Unit (GPU) is a promising platform to implement Deep Packet Inspection (DPI) due to the GPU's rich parallelism and programmability for high performance and frequent pattern update requirements. However, it is a great challenge to achieve a high performance implementation due to the GPU's performance sensitivity to ...
Keywords: GPU, Pattern matching, Optimization techniques, Deep packet inspection

2
August 2012 International Journal of Security and Networks: Volume 7 Issue 1, August 2012
Publisher: Inderscience Publishers
Bibliometrics:
Citation Count: 0

Hazardous worms can compromise hundreds of thousands of hosts in just hours. Mitigating these worm threats requires fast and effective strategies for containment and is a difficult task. Many containment systems have been proposed including anomaly detection, address blacklisting and signature-based content filtering. Meanwhile recently developed worm models enable us ...

3
November 2011 Journal of Network and Computer Applications: Volume 34 Issue 6, November, 2011
Publisher: Academic Press Ltd.
Bibliometrics:
Citation Count: 3

High information quality is a paramount requirement for wireless sensor network (WSN) monitoring applications. However, it is challenging to achieve a cost effective information quality solution due to unpredictable environment noise and events, unreliable wireless channel and network bandwidth, and sensor resource and energy constraints. Specifically, the dynamic and unreliable ...
Keywords: Rate and bandwidth control, Modeling and performance evaluation

4
October 2011 ITHINGSCPSCOM '11: Proceedings of the 2011 International Conference on Internet of Things and 4th International Conference on Cyber, Physical and Social Computing
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 1

Graphics processing units (GPU) can be used to accelerate deep packet inspection. However, the state transition tables used to implement deterministic finite automata are very large and must be stored in DRAM, which inhibits performance and may cause non-deterministic scanning rates. In this work we present GPEP, a GPU-based deep ...

5
June 2011 Computer Networks: The International Journal of Computer and Telecommunications Networking: Volume 55 Issue 8, June, 2011
Publisher: Elsevier North-Holland, Inc.
Bibliometrics:
Citation Count: 0

An intrusion detection system (IDS) is a promising technique for detecting and thwarting attacks on computer systems and networks. In the context of ever-changing threats, new attacks are constantly created, and new rules for identifying them are dramatically increasing. To adapt to these new rules, IDSs must be easily reconfigurable, ...
Keywords: Intrusion detection, Adaptive systems, Security system

6 published by ACM
February 2011 ACM Transactions on Architecture and Code Optimization (TACO): Volume 8 Issue 1, April 2011
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 6,   Downloads (12 Months): 41,   Downloads (Overall): 494

Full text available: PDFPDF
Memory-based Deterministic Finite Automata (DFA) are ideal for pattern matching in network intrusion detection systems due to their deterministic performance and ease of update of new patterns, however severe DFA memory requirements make it impractical to implement thousands of patterns. This article aims to understand the basic relationship between DFA ...
Keywords: encoding optimization, Pattern matching, deterministic finite automata

7
February 2011 The Computer Journal: Volume 54 Issue 2, February 2011
Publisher: Oxford University Press
Bibliometrics:
Citation Count: 1

As network speeds continue to increase, so does the need for scalable pattern matching for deep packet scanning applications such as signature-based network intrusion detection. Multiple-stride deterministic finite automaton (DFA) increases the performance of pattern matching, because they allow multiple bytes of a packet to be scanned simultaneously. However, traditional ...

8
January 2011
Bibliometrics:
Citation Count: 0

Networks are becoming increasingly complex, making network quality of service (QoS) an ongoing and difficult problem. Important QoS challenges include ensuring availability of services, privacy and accuracy of data and preventing data loss. These challenges can be addressed by providing effective security mechanisms that meet the scalability requirements ...

9
December 2009 ICICS'09: Proceedings of the 11th international conference on Information and Communications Security
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 1

In the midst of vastly numbered and quickly growing internet security threats, Network Intrusion Detection System (NIDS) becomes more important to network security every day. Vital to effective NIDS is a multi-pattern matching engine which requires deterministic performance and adaptability to new threats. Memory-based Deterministic Finite Automata (DFA) are ideal ...

10
December 2009 ICICS'09: Proceedings of the 11th international conference on Information and Communications Security
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 0

Signature-based network intrusion detection requires fast and reconfigurable pattern matching for deep packet inspection. This paper presents a novel pattern matching engine, which exploits a memory-based programmable state machine to achieve deterministic processing rates that are independent of packet and pattern characteristics. Our engine is a portable predictive pattern matching ...

11 published by ACM
October 2009 ANCS '09: Proceedings of the 5th ACM/IEEE Symposium on Architectures for Networking and Communications Systems
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 0,   Downloads (12 Months): 10,   Downloads (Overall): 101

Full text available: PDFPDF
In the midst of vastly numbered and quickly growing internet security threats, Network Intrusion Detection System (NIDS) [2] becomes more important to network security every day. Vital to effective NIDS is a multi-pattern matching engine which requires deterministic performance and adaptability to new threats [3]. Memory-based Deterministic Finite Automata (DFA) ...

12 published by ACM
October 2009 ANCS '09: Proceedings of the 5th ACM/IEEE Symposium on Architectures for Networking and Communications Systems
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 0,   Downloads (12 Months): 5,   Downloads (Overall): 66

Full text available: PDFPDF
Dangerous worms like CodeRed or Slammer can spread millions of probe packets in just seconds which can result in thousands of infected hosts and large losses. Fast and effective containment strategies are crucially important to protect the Internet Infrastructure. Toward this goal of fast and effective worm containment, different techniques ...

13
October 2009 Microprocessors & Microsystems: Volume 33 Issue 7-8, October, 2009
Publisher: Elsevier Science Publishers B. V.
Bibliometrics:
Citation Count: 1

One of the most promising techniques to detect and thwart a network attack in a network intrusion detection system is to compare each incoming packet with pre-defined attack patterns. This comparison can be performed by a pattern matching engine which has several key requirements including scalability to line rates of ...
Keywords: Memory decoder design, Pattern matching, Network intrusion detection

14
July 2009 ASAP '09: Proceedings of the 2009 20th IEEE International Conference on Application-specific Systems, Architectures and Processors
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 2

Signature-based network intrusion detection requires fast and reconfigurable pattern matching for deep packet inspection. In our previous work we address this problem with a hardware based pattern matching engine that utilizes a novel state encoding scheme to allow memory efficient use of Deterministic Finite Automata. In this work we expand ...

15
January 2009 IEEE Network: The Magazine of Global Internetworking - Special issue title on recent developments in network intrusion detection: Volume 23 Issue 1, January/February 2009
Publisher: IEEE Press
Bibliometrics:
Citation Count: 6

One way to detect and thwart a network attack is to compare each incoming packet with predefined patterns, also called an attack pattern database, and raise an alert upon detecting a match. This article presents a novel pattern-matching engine that exploits a memory-based, programmable state machine to achieve deterministic processing ...



The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us