A Signature Match Processor Architecture for Network Intrusion Detection.
Janardhan SingarajuLong BuJohn A. ChandyPublished in: FCCM (2005)
Keyphrases
- network intrusion detection
- intrusion detection
- network intrusion
- anomaly detection
- intrusion detection system
- parallel architecture
- fraud detection
- network anomaly detection
- instruction set
- network traffic data
- level parallelism
- network traffic
- processing elements
- artificial immune
- supervised learning
- network attacks
- network intrusions
- data sets
- probabilistic model
- data model
- video sequences
- machine learning
- real world