{"id":"https://openalex.org/W2153102141","doi":"https://doi.org/10.1109/fpga.2002.1106666","title":"Assisting network intrusion detection with reconfigurable hardware","display_name":"Assisting network intrusion detection with reconfigurable hardware","publication_year":2003,"publication_date":"2003-06-26","ids":{"openalex":"https://openalex.org/W2153102141","doi":"https://doi.org/10.1109/fpga.2002.1106666","mag":"2153102141"},"language":"en","primary_location":{"id":"doi:10.1109/fpga.2002.1106666","is_oa":false,"landing_page_url":"https://doi.org/10.1109/fpga.2002.1106666","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings. 10th Annual IEEE Symposium on Field-Programmable Custom Computing Machines","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5018034033","display_name":"Brad Hutchings","orcid":"https://orcid.org/0000-0002-2991-0230"},"institutions":[{"id":"https://openalex.org/I100005738","display_name":"Brigham Young University","ror":"https://ror.org/047rhhm47","country_code":"US","type":"education","lineage":["https://openalex.org/I100005738"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"B.L. Hutchings","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Brigham Young University, Provo, UT, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Brigham Young University, Provo, UT, USA","institution_ids":["https://openalex.org/I100005738"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072540623","display_name":"Ruben J Franklin","orcid":null},"institutions":[{"id":"https://openalex.org/I100005738","display_name":"Brigham Young University","ror":"https://ror.org/047rhhm47","country_code":"US","type":"education","lineage":["https://openalex.org/I100005738"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"R. Franklin","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Brigham Young University, Provo, UT, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Brigham Young University, Provo, UT, USA","institution_ids":["https://openalex.org/I100005738"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5075830120","display_name":"D. Carver","orcid":null},"institutions":[{"id":"https://openalex.org/I100005738","display_name":"Brigham Young University","ror":"https://ror.org/047rhhm47","country_code":"US","type":"education","lineage":["https://openalex.org/I100005738"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"D. Carver","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Brigham Young University, Provo, UT, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Brigham Young University, Provo, UT, USA","institution_ids":["https://openalex.org/I100005738"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5018034033"],"corresponding_institution_ids":["https://openalex.org/I100005738"],"apc_list":null,"apc_paid":null,"fwci":25.4059,"has_fulltext":false,"cited_by_count":296,"citation_normalized_percentile":{"value":0.99805163,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"111","last_page":"120"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11269","display_name":"Algorithms and Data Compression","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.992900013923645,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/field-programmable-gate-array","display_name":"Field-programmable gate array","score":0.850610077381134},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7575099468231201},{"id":"https://openalex.org/keywords/regular-expression","display_name":"Regular expression","score":0.7114888429641724},{"id":"https://openalex.org/keywords/netlist","display_name":"Netlist","score":0.6650223135948181},{"id":"https://openalex.org/keywords/bitstream","display_name":"Bitstream","score":0.6234225034713745},{"id":"https://openalex.org/keywords/string-searching-algorithm","display_name":"String searching algorithm","score":0.5949084758758545},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.5448574423789978},{"id":"https://openalex.org/keywords/string","display_name":"String (physics)","score":0.5291602611541748},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.4807950556278229},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.46354028582572937},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.44479838013648987},{"id":"https://openalex.org/keywords/pattern-matching","display_name":"Pattern matching","score":0.40304017066955566},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.18592366576194763},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.17414429783821106},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.12890031933784485},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.10805723071098328}],"concepts":[{"id":"https://openalex.org/C42935608","wikidata":"https://www.wikidata.org/wiki/Q190411","display_name":"Field-programmable gate array","level":2,"score":0.850610077381134},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7575099468231201},{"id":"https://openalex.org/C121329065","wikidata":"https://www.wikidata.org/wiki/Q185612","display_name":"Regular expression","level":2,"score":0.7114888429641724},{"id":"https://openalex.org/C177650935","wikidata":"https://www.wikidata.org/wiki/Q1760303","display_name":"Netlist","level":2,"score":0.6650223135948181},{"id":"https://openalex.org/C136695289","wikidata":"https://www.wikidata.org/wiki/Q415568","display_name":"Bitstream","level":3,"score":0.6234225034713745},{"id":"https://openalex.org/C7757238","wikidata":"https://www.wikidata.org/wiki/Q374040","display_name":"String searching algorithm","level":3,"score":0.5949084758758545},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.5448574423789978},{"id":"https://openalex.org/C157486923","wikidata":"https://www.wikidata.org/wiki/Q1376436","display_name":"String (physics)","level":2,"score":0.5291602611541748},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.4807950556278229},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.46354028582572937},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.44479838013648987},{"id":"https://openalex.org/C68859911","wikidata":"https://www.wikidata.org/wiki/Q1503724","display_name":"Pattern matching","level":2,"score":0.40304017066955566},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.18592366576194763},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.17414429783821106},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.12890031933784485},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.10805723071098328},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/fpga.2002.1106666","is_oa":false,"landing_page_url":"https://doi.org/10.1109/fpga.2002.1106666","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings. 10th Annual IEEE Symposium on Field-Programmable Custom Computing Machines","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W185586470","https://openalex.org/W1674877186","https://openalex.org/W1707172707","https://openalex.org/W2095646789","https://openalex.org/W2133301618","https://openalex.org/W2151812287","https://openalex.org/W2157431560","https://openalex.org/W2158583421","https://openalex.org/W2171455717","https://openalex.org/W4241851591","https://openalex.org/W6637096788","https://openalex.org/W6637452973","https://openalex.org/W6683142861"],"related_works":["https://openalex.org/W3127435654","https://openalex.org/W2919561762","https://openalex.org/W4394766506","https://openalex.org/W3009852985","https://openalex.org/W3217774925","https://openalex.org/W4200122249","https://openalex.org/W1492858093","https://openalex.org/W2092552144","https://openalex.org/W3216580934","https://openalex.org/W1980331464"],"abstract_inverted_index":{"String":[0],"matching":[1,74],"is":[2,20,98],"used":[3],"by":[4,34,85,100,126],"Network":[5],"Intrusion":[6],"Detection":[7],"Systems":[8],"(NIDS)":[9],"to":[10,43,88],"inspect":[11],"incoming":[12],"packet":[13],"payloads":[14],"for":[15,128],"hostile":[16],"data.":[17],"String-matching":[18,28],"speed":[19],"often":[21],"the":[22,57,102,105,110,120,123],"main":[23],"factor":[24],"limiting":[25],"NIDS":[26,59],"performance.":[27],"performance":[29,103,121],"can":[30,82],"be":[31,83],"dramatically":[32],"improved":[33],"using":[35],"Field-Programmable":[36],"Gate":[37],"Arrays":[38],"(FPGAs);":[39],"accordingly,":[40],"a":[41,62,71],"\"regular-expression":[42],"FPGA":[44,91],"circuit\"":[45],"module":[46,52],"generator":[47,53],"has":[48],"been":[49],"developed.":[50],"The":[51,93,115],"extracts":[54],"strings":[55],"from":[56],"Snort":[58],"rule-set,":[60],"generates":[61,77],"regular":[63],"expression":[64],"that":[65,81],"matches":[66],"all":[67],"extracted":[68],"strings,":[69],"synthesizes":[70],"FPGA-based":[72,106,116],"string":[73,107,117],"circuit,":[75],"and":[76],"an":[78,90],"EDIF":[79],"netlist":[80],"processed":[84],"Xilinx":[86],"software":[87],"create":[89],"bitstream.":[92],"feasibility":[94],"of":[95,104,122],"this":[96],"approach":[97],"demonstrated":[99],"comparing":[101],"matcher":[108,118],"against":[109],"software-based":[111,124],"GNU":[112],"regex":[113],"program.":[114],"exceeds":[119],"system":[125],"600x":[127],"large":[129],"patterns.":[130]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":5},{"year":2016,"cited_by_count":4},{"year":2015,"cited_by_count":7},{"year":2014,"cited_by_count":10},{"year":2013,"cited_by_count":9},{"year":2012,"cited_by_count":16}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
