{"id":"https://openalex.org/W3007662816","doi":"https://doi.org/10.1109/lcnsymposium47956.2019.9000666","title":"A Lightweight Estimation Algorithm To Auto Configure Snort Fast Pattern Matcher","display_name":"A Lightweight Estimation Algorithm To Auto Configure Snort Fast Pattern Matcher","publication_year":2019,"publication_date":"2019-10-01","ids":{"openalex":"https://openalex.org/W3007662816","doi":"https://doi.org/10.1109/lcnsymposium47956.2019.9000666","mag":"3007662816"},"language":"en","primary_location":{"id":"doi:10.1109/lcnsymposium47956.2019.9000666","is_oa":false,"landing_page_url":"https://doi.org/10.1109/lcnsymposium47956.2019.9000666","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE 44th LCN Symposium on Emerging Topics in Networking (LCN Symposium)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100441352","display_name":"Chenxi Li","orcid":"https://orcid.org/0000-0002-9106-8048"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Chenxi Li","raw_affiliation_strings":["Tsinghua University,Institute for Network Sciences and Cyberspace,Beijing,China","Institute for Network Sciences and Cyberspace, Tsinghua University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Tsinghua University,Institute for Network Sciences and Cyberspace,Beijing,China","institution_ids":["https://openalex.org/I99065089"]},{"raw_affiliation_string":"Institute for Network Sciences and Cyberspace, Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023416195","display_name":"Jiahai Yang","orcid":"https://orcid.org/0000-0001-6109-6737"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiahai Yang","raw_affiliation_strings":["Tsinghua University,Institute for Network Sciences and Cyberspace,Beijing,China","Institute for Network Sciences and Cyberspace, Tsinghua University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Tsinghua University,Institute for Network Sciences and Cyberspace,Beijing,China","institution_ids":["https://openalex.org/I99065089"]},{"raw_affiliation_string":"Institute for Network Sciences and Cyberspace, Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101539302","display_name":"Li Guo","orcid":"https://orcid.org/0000-0003-0813-4145"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guo Li","raw_affiliation_strings":["Tsinghua University,Institute for Network Sciences and Cyberspace,Beijing,China","Institute for Network Sciences and Cyberspace, Tsinghua University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Tsinghua University,Institute for Network Sciences and Cyberspace,Beijing,China","institution_ids":["https://openalex.org/I99065089"]},{"raw_affiliation_string":"Institute for Network Sciences and Cyberspace, Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100381658","display_name":"Kang Wang","orcid":"https://orcid.org/0000-0002-6581-2259"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kang Wang","raw_affiliation_strings":["Tsinghua University,Institute for Network Sciences and Cyberspace,Beijing,China","Institute for Network Sciences and Cyberspace, Tsinghua University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Tsinghua University,Institute for Network Sciences and Cyberspace,Beijing,China","institution_ids":["https://openalex.org/I99065089"]},{"raw_affiliation_string":"Institute for Network Sciences and Cyberspace, Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100441352"],"corresponding_institution_ids":["https://openalex.org/I99065089"],"apc_list":null,"apc_paid":null,"fwci":0.4815,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.64218628,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"175","last_page":"182"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8704849481582642},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.6851134896278381},{"id":"https://openalex.org/keywords/modular-design","display_name":"Modular design","score":0.5778794884681702},{"id":"https://openalex.org/keywords/focus","display_name":"Focus (optics)","score":0.5727748274803162},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.5232545137405396},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.5167019367218018},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.493233859539032},{"id":"https://openalex.org/keywords/scheduling","display_name":"Scheduling (production processes)","score":0.46622657775878906},{"id":"https://openalex.org/keywords/virtualization","display_name":"Virtualization","score":0.4642655849456787},{"id":"https://openalex.org/keywords/network-functions-virtualization","display_name":"Network Functions Virtualization","score":0.45869770646095276},{"id":"https://openalex.org/keywords/virtual-network","display_name":"Virtual network","score":0.42808955907821655},{"id":"https://openalex.org/keywords/virtual-machine","display_name":"Virtual machine","score":0.4211188852787018},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.41668909788131714},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3343801498413086},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.3257634937763214},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.28700125217437744},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.22788438200950623},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.20200583338737488},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.18439772725105286}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8704849481582642},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.6851134896278381},{"id":"https://openalex.org/C101468663","wikidata":"https://www.wikidata.org/wiki/Q1620158","display_name":"Modular design","level":2,"score":0.5778794884681702},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.5727748274803162},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.5232545137405396},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.5167019367218018},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.493233859539032},{"id":"https://openalex.org/C206729178","wikidata":"https://www.wikidata.org/wiki/Q2271896","display_name":"Scheduling (production processes)","level":2,"score":0.46622657775878906},{"id":"https://openalex.org/C513985346","wikidata":"https://www.wikidata.org/wiki/Q270471","display_name":"Virtualization","level":3,"score":0.4642655849456787},{"id":"https://openalex.org/C200789330","wikidata":"https://www.wikidata.org/wiki/Q7000834","display_name":"Network Functions Virtualization","level":3,"score":0.45869770646095276},{"id":"https://openalex.org/C2776874963","wikidata":"https://www.wikidata.org/wiki/Q4112081","display_name":"Virtual network","level":2,"score":0.42808955907821655},{"id":"https://openalex.org/C25344961","wikidata":"https://www.wikidata.org/wiki/Q192726","display_name":"Virtual machine","level":2,"score":0.4211188852787018},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.41668909788131714},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3343801498413086},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.3257634937763214},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.28700125217437744},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.22788438200950623},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.20200583338737488},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.18439772725105286},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C120665830","wikidata":"https://www.wikidata.org/wiki/Q14620","display_name":"Optics","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C21547014","wikidata":"https://www.wikidata.org/wiki/Q1423657","display_name":"Operations management","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/lcnsymposium47956.2019.9000666","is_oa":false,"landing_page_url":"https://doi.org/10.1109/lcnsymposium47956.2019.9000666","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE 44th LCN Symposium on Emerging Topics in Networking (LCN Symposium)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W1674877186","https://openalex.org/W1802290782","https://openalex.org/W2026372785","https://openalex.org/W2110153733","https://openalex.org/W2139325411","https://openalex.org/W2162080541","https://openalex.org/W2186235491","https://openalex.org/W2535035287"],"related_works":["https://openalex.org/W2088620127","https://openalex.org/W2743348030","https://openalex.org/W1963799338","https://openalex.org/W2160885694","https://openalex.org/W2900408237","https://openalex.org/W2036412865","https://openalex.org/W2542775576","https://openalex.org/W2947629119","https://openalex.org/W2545334782","https://openalex.org/W2346893066"],"abstract_inverted_index":{"With":[0],"the":[1,26,32,46,84,100,114,157,176,183,193],"emergence":[2],"of":[3,28,36,45,103,118],"Network":[4,21],"Function":[5,22],"Virtualization":[6],"(NFV)":[7],"technology,":[8],"researchers":[9],"start":[10],"to":[11,24,39,91,111,147,159,191,201],"implement":[12,156],"typical":[13],"software":[14],"Intrusion":[15],"detection":[16,136],"Systems":[17],"(IDS)":[18],"as":[19],"Virtual":[20,62],"(VNF)":[23],"improve":[25],"scalability":[27],"IDS":[29,58,79],"deployment.":[30],"Determining":[31],"setups":[33,65],"and":[34,66,77,163,210],"configurations":[35],"every":[37],"instance":[38],"optimize":[40],"VNF":[41],"performance":[42],"is":[43,196],"one":[44,178],"core":[47],"challenges":[48],"in":[49,179,182],"NFV":[50,208],"scenario.":[51],"Previous":[52],"researches":[53],"mainly":[54],"focus":[55,98],"on":[56,99,133],"how":[57,128],"performs":[59],"under":[60,80],"different":[61,75,81],"Machine":[63],"(VM)":[64],"just":[67,186],"load":[68],"its":[69,161],"default":[70,85,177],"configuration.":[71],"However,":[72],"when":[73],"loading":[74],"rulesets":[76],"running":[78],"VM":[82],"setups,":[83],"configuration":[86,101,151,174,205],"may":[87],"not":[88],"always":[89],"lead":[90],"optimal":[92],"performance.":[93],"In":[94],"this":[95],"paper,":[96],"we":[97,142,155,199],"problem":[102],"Snort.":[104],"We":[105,125],"propose":[106],"a":[107,172,188],"lightweight":[108],"estimation":[109],"algorithm":[110,158,169],"auto":[112,150,204],"configure":[113],"most":[115],"performance-related":[116],"part":[117],"Snort":[119],"-":[120],"Fast":[121],"Pattern":[122],"Matcher":[123],"(FPM).":[124],"firstly":[126],"explore":[127],"those":[129],"options":[130],"make":[131],"influence":[132],"Snort's":[134],"packet":[135],"by":[137],"several":[138],"measurement":[139],"experiments.":[140],"Then":[141],"summarize":[143],"some":[144],"basic":[145],"principles":[146],"design":[148],"our":[149,168],"algorithm.":[152],"At":[153],"last,":[154],"evaluate":[160],"accuracy":[162],"efficiency.":[164],"The":[165],"result":[166],"shows":[167],"can":[170],"seek":[171],"better":[173],"than":[175],"various":[180],"situations;":[181],"meanwhile,":[184],"it":[185],"takes":[187],"few":[189],"seconds":[190],"run":[192],"algorithm,":[194],"which":[195],"important":[197],"if":[198],"want":[200],"import":[202],"an":[203],"modular":[206],"into":[207],"dynamic":[209],"elastic":[211],"scheduling":[212],"strategy.":[213]},"counts_by_year":[{"year":2022,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
