{"id":"https://openalex.org/W1988431020","doi":"https://doi.org/10.1109/tnet.2011.2172456","title":"Accelerating Multipattern Matching on Compressed HTTP Traffic","display_name":"Accelerating Multipattern Matching on Compressed HTTP Traffic","publication_year":2011,"publication_date":"2011-10-28","ids":{"openalex":"https://openalex.org/W1988431020","doi":"https://doi.org/10.1109/tnet.2011.2172456","mag":"1988431020"},"language":"en","primary_location":{"id":"doi:10.1109/tnet.2011.2172456","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnet.2011.2172456","pdf_url":null,"source":{"id":"https://openalex.org/S62238642","display_name":"IEEE/ACM Transactions on Networking","issn_l":"1063-6692","issn":["1063-6692","1558-2566"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE/ACM Transactions on Networking","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5091083281","display_name":"Anat Bremler-Barr","orcid":"https://orcid.org/0000-0002-8165-2558"},"institutions":[{"id":"https://openalex.org/I138898306","display_name":"Reichman University","ror":"https://ror.org/01px5cv07","country_code":"IL","type":"education","lineage":["https://openalex.org/I138898306"]}],"countries":["IL"],"is_corresponding":true,"raw_author_name":"A. Bremler-Barr","raw_affiliation_strings":["Efi Arazi School of Computer Science, Interdisciplinary Center, Herzliya, Israel","Efi Arazi School of Computer Science, The Interdisciplinary Center, Herzlia, Israel#TAB#"],"affiliations":[{"raw_affiliation_string":"Efi Arazi School of Computer Science, Interdisciplinary Center, Herzliya, Israel","institution_ids":["https://openalex.org/I138898306"]},{"raw_affiliation_string":"Efi Arazi School of Computer Science, The Interdisciplinary Center, Herzlia, Israel#TAB#","institution_ids":["https://openalex.org/I138898306"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5084188510","display_name":"Yaron Koral","orcid":"https://orcid.org/0000-0002-0752-2122"},"institutions":[{"id":"https://openalex.org/I16391192","display_name":"Tel Aviv University","ror":"https://ror.org/04mhzgx49","country_code":"IL","type":"education","lineage":["https://openalex.org/I16391192"]}],"countries":["IL"],"is_corresponding":false,"raw_author_name":"Y. Koral","raw_affiliation_strings":["Blavatnik School of Computer Sciences, Tel-Aviv University, Tel-Aviv, Israel","Blavatnik Sch. of Comput. Sci., Tel-Avivel-Aviv Univ., Tel-Aviv, Israel"],"affiliations":[{"raw_affiliation_string":"Blavatnik School of Computer Sciences, Tel-Aviv University, Tel-Aviv, Israel","institution_ids":["https://openalex.org/I16391192"]},{"raw_affiliation_string":"Blavatnik Sch. of Comput. Sci., Tel-Avivel-Aviv Univ., Tel-Aviv, Israel","institution_ids":["https://openalex.org/I16391192"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5091083281"],"corresponding_institution_ids":["https://openalex.org/I138898306"],"apc_list":null,"apc_paid":null,"fwci":2.0615,"has_fulltext":false,"cited_by_count":29,"citation_normalized_percentile":{"value":0.87165086,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":"20","issue":"3","first_page":"970","last_page":"983"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.825424313545227},{"id":"https://openalex.org/keywords/matching","display_name":"Matching (statistics)","score":0.5273298025131226},{"id":"https://openalex.org/keywords/pattern-matching","display_name":"Pattern matching","score":0.49356234073638916},{"id":"https://openalex.org/keywords/data-compression","display_name":"Data compression","score":0.4785633385181427},{"id":"https://openalex.org/keywords/firewall","display_name":"Firewall (physics)","score":0.46104949712753296},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4274788796901703},{"id":"https://openalex.org/keywords/string-searching-algorithm","display_name":"String searching algorithm","score":0.4117478132247925},{"id":"https://openalex.org/keywords/web-traffic","display_name":"Web traffic","score":0.4111935496330261},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.2621692717075348},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.253791481256485},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.17735889554023743},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1260766088962555},{"id":"https://openalex.org/keywords/entropy","display_name":"Entropy (arrow of time)","score":0.10192671418190002}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.825424313545227},{"id":"https://openalex.org/C165064840","wikidata":"https://www.wikidata.org/wiki/Q1321061","display_name":"Matching (statistics)","level":2,"score":0.5273298025131226},{"id":"https://openalex.org/C68859911","wikidata":"https://www.wikidata.org/wiki/Q1503724","display_name":"Pattern matching","level":2,"score":0.49356234073638916},{"id":"https://openalex.org/C78548338","wikidata":"https://www.wikidata.org/wiki/Q2493","display_name":"Data compression","level":2,"score":0.4785633385181427},{"id":"https://openalex.org/C77714075","wikidata":"https://www.wikidata.org/wiki/Q5452017","display_name":"Firewall (physics)","level":5,"score":0.46104949712753296},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4274788796901703},{"id":"https://openalex.org/C7757238","wikidata":"https://www.wikidata.org/wiki/Q374040","display_name":"String searching algorithm","level":3,"score":0.4117478132247925},{"id":"https://openalex.org/C2777672014","wikidata":"https://www.wikidata.org/wiki/Q1172573","display_name":"Web traffic","level":3,"score":0.4111935496330261},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.2621692717075348},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.253791481256485},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.17735889554023743},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1260766088962555},{"id":"https://openalex.org/C106301342","wikidata":"https://www.wikidata.org/wiki/Q4117933","display_name":"Entropy (arrow of time)","level":2,"score":0.10192671418190002},{"id":"https://openalex.org/C183915046","wikidata":"https://www.wikidata.org/wiki/Q1316152","display_name":"Charged black hole","level":4,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C104062141","wikidata":"https://www.wikidata.org/wiki/Q2601295","display_name":"Extremal black hole","level":3,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tnet.2011.2172456","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnet.2011.2172456","pdf_url":null,"source":{"id":"https://openalex.org/S62238642","display_name":"IEEE/ACM Transactions on Networking","issn_l":"1063-6692","issn":["1063-6692","1558-2566"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE/ACM Transactions on Networking","raw_type":"journal-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.725.4703","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.725.4703","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.faculty.idc.ac.il/bremler/Papers/JournalACCH.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320307791","display_name":"Cisco Systems","ror":"https://ror.org/03yt1ez60"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":35,"referenced_works":["https://openalex.org/W1499930986","https://openalex.org/W1507645144","https://openalex.org/W1514337702","https://openalex.org/W1516458697","https://openalex.org/W1563408602","https://openalex.org/W1573867106","https://openalex.org/W1586630604","https://openalex.org/W1777016212","https://openalex.org/W1832628917","https://openalex.org/W1834037038","https://openalex.org/W1977610499","https://openalex.org/W2024171325","https://openalex.org/W2043731712","https://openalex.org/W2049650913","https://openalex.org/W2060108852","https://openalex.org/W2062657631","https://openalex.org/W2063109203","https://openalex.org/W2071262136","https://openalex.org/W2099964107","https://openalex.org/W2106062486","https://openalex.org/W2107745473","https://openalex.org/W2108522784","https://openalex.org/W2119423764","https://openalex.org/W2133248397","https://openalex.org/W2134684274","https://openalex.org/W2134826720","https://openalex.org/W2135494327","https://openalex.org/W2148310801","https://openalex.org/W2752885492","https://openalex.org/W3145128584","https://openalex.org/W4246219036","https://openalex.org/W6630736157","https://openalex.org/W6634726898","https://openalex.org/W6635116394","https://openalex.org/W6676122042"],"related_works":["https://openalex.org/W3145288231","https://openalex.org/W2371263218","https://openalex.org/W2092552144","https://openalex.org/W2354196777","https://openalex.org/W2965473297","https://openalex.org/W2108265183","https://openalex.org/W2257399947","https://openalex.org/W2248278495","https://openalex.org/W2386746909","https://openalex.org/W2387316851"],"abstract_inverted_index":{"Current":[0],"security":[1],"tools,":[2],"using":[3],"\u201csignature-based\u201d":[4],"detection,":[5],"do":[6],"not":[7],"handle":[8],"compressed":[9,20,109,139],"traffic,":[10],"whose":[11],"market-share":[12],"is":[13,101],"constantly":[14],"increasing.":[15],"This":[16],"paper":[17,129],"focuses":[18],"on":[19,107,117,138],"HTTP":[21,23,48,73,140],"traffic.":[22,119],"uses":[24],"GZIP":[25],"compression":[26],"and":[27,75,142],"requires":[28],"some":[29],"kind":[30],"of":[31,53,87,114,134],"decompression":[32,58],"phase":[33,59],"before":[34],"performing":[35],"a":[36,41,144],"string":[37],"matching.":[38],"We":[39],"present":[40],"novel":[42],"algorithm,":[43],"Aho-Corasick-based":[44],"algorithm":[45],"for":[46],"Compressed":[47],"(ACCH),":[49],"that":[50,83,99,130],"takes":[51],"advantage":[52],"information":[54],"gathered":[55],"by":[56],"the":[57,64,88,108,112,127,132],"in":[60,93],"order":[61],"to":[62,85,103],"accelerate":[63],"commonly":[65],"used":[66],"Aho-Corasick":[67],"pattern-matching":[68],"algorithm.":[69],"By":[70],"analyzing":[71],"real":[72,76],"traffic":[74,141],"Web":[77],"application":[78],"firewall":[79],"signatures,":[80],"we":[81,97,123,125],"show":[82,98],"up":[84],"84%":[86],"data":[89],"can":[90],"be":[91],"skipped":[92],"its":[94],"scan.":[95],"Surprisingly,":[96],"it":[100],"faster":[102],"perform":[104],"pattern":[105],"matching":[106,137],"data,":[110],"with":[111],"penalty":[113],"decompression,":[115],"than":[116],"regular":[118],"As":[120],"far":[121],"as":[122],"know,":[124],"are":[126],"first":[128],"analyzes":[131],"problem":[133],"\u201con-the-fly\u201d":[135],"multipattern":[136],"suggest":[143],"solution.":[145]},"counts_by_year":[{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":5},{"year":2017,"cited_by_count":3},{"year":2016,"cited_by_count":3},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":3},{"year":2013,"cited_by_count":4},{"year":2012,"cited_by_count":1}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
