Intrusion detection methods based on network processor

被引:0
|
作者
Wei, Lihua
Zhang, Xiaoming
Tang, Yuhua
Sun, Zhigang
机构
[1] School of Information Engineering, Jiaxing University in Zhejiang Province, Jiaxing 314001, China
[2] School of Computer, National University of Defence Technology, Changsha 410073, China
来源
关键词
12;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:160 / 162
相关论文
共 50 条
  • [1] Researches on intrusion-detection methods based-on network processor
    Wei Lihua
    Sun Zhigang
    Tang Yuhua
    Zhang Xiaoming
    [J]. 2005 International Symposium on Computer Science and Technology, Proceedings, 2005, : 471 - 478
  • [2] Researches on parallel intrusion detection methods based-on network processor
    Li, FM
    Zhang, HF
    Yang, K
    [J]. DCABES 2004, Proceedings, Vols, 1 and 2, 2004, : 1040 - 1044
  • [3] Network processor based network intrusion detection system
    Cho, H
    Kim, D
    Kim, J
    Doh, Y
    Jang, J
    [J]. INFORMATION NETWORKING: NETWORKING TECHNOLOGIES FOR BROADBAND AND MOBILE NETWORKS, 2004, 3090 : 973 - 982
  • [4] Embedded network processor based parallel intrusion detection
    Hu Yueming
    [J]. Embedded Systems - Modeling, Technology and Applications, Proceedings, 2006, : 93 - 99
  • [5] Study on high-speed network intrusion detection based on network processor
    Computer Network Key Lab., South China University of Technology, Guangzhou 510640, China
    不详
    [J]. Zhongshan Daxue Xuebao, 2006, SUPPL. (31-34):
  • [6] ANOMALY-BASED NETWORK INTRUSION DETECTION METHODS
    Nevlud, Pavel
    Bures, Miroslav
    Kapicak, Lukas
    Zdralek, Jaroslav
    [J]. ADVANCES IN ELECTRICAL AND ELECTRONIC ENGINEERING, 2013, 11 (06) : 468 - 474
  • [7] Network intrusion detection methods based on deep learning
    Li X.
    Zhang S.
    [J]. Recent Patents on Engineering, 2021, 15 (04):
  • [8] A signature match processor architecture for network intrusion detection
    Singaraju, J
    Bu, L
    Chandy, JA
    [J]. FCCM 2005: 13TH ANNUAL IEEE SYMPOSIUM ON FIELD-PROGRAMMABLE CUSTOM COMPUTING MACHINES, PROCEEDINGS, 2005, : 235 - 242
  • [9] The methods of network traffic statistical anomaly detection based on Network processor
    Yun, Li
    Ge, Renhua
    Li, Jinghua
    [J]. IITAW: 2009 THIRD INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY APPLICATIONS WORKSHOPS, 2009, : 54 - +
  • [10] Software-based packet classification in network intrusion detection system using network processor
    Salim, Robin
    Rao, G. S. V. Radha Krishna
    [J]. TENCON 2006 - 2006 IEEE REGION 10 CONFERENCE, VOLS 1-4, 2006, : 1612 - +