Two-stage decomposition of SNORT rules towards efficient hardware implementation.
Hao ChenDouglas H. SummervilleYu ChenPublished in: DRCN (2009)
Keyphrases
- anomaly detection
- hardware implementation
- network intrusion detection
- intrusion detection system
- intrusion detection
- network traffic
- efficient implementation
- signal processing
- dedicated hardware
- association rules
- fpga implementation
- neural network
- hardware design
- hardware architecture
- software implementation
- real time
- computer vision
- massively parallel
- parallel architecture
- memory management