{"id":"https://openalex.org/W2003003064","doi":"https://doi.org/10.1145/1323548.1323551","title":"Optimization of pattern matching algorithm for memory based architecture","display_name":"Optimization of pattern matching algorithm for memory based architecture","publication_year":2007,"publication_date":"2007-12-03","ids":{"openalex":"https://openalex.org/W2003003064","doi":"https://doi.org/10.1145/1323548.1323551","mag":"2003003064"},"language":"en","primary_location":{"id":"doi:10.1145/1323548.1323551","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1323548.1323551","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 3rd ACM/IEEE Symposium on Architecture for networking and communications systems","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5019119010","display_name":"Cheng-Hung Lin","orcid":"https://orcid.org/0000-0001-9254-9751"},"institutions":[{"id":"https://openalex.org/I25846049","display_name":"National Tsing Hua University","ror":"https://ror.org/00zdnkx70","country_code":"TW","type":"education","lineage":["https://openalex.org/I25846049"]}],"countries":["TW"],"is_corresponding":true,"raw_author_name":"Cheng-Hung Lin","raw_affiliation_strings":["National Tsing Hua University, Taiwan, R.O.C","National Tsing Hua University, Taiwan, R. O. C.#TAB#"],"affiliations":[{"raw_affiliation_string":"National Tsing Hua University, Taiwan, R.O.C","institution_ids":["https://openalex.org/I25846049"]},{"raw_affiliation_string":"National Tsing Hua University, Taiwan, R. O. C.#TAB#","institution_ids":["https://openalex.org/I25846049"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060311496","display_name":"Yu-Tang Tai","orcid":null},"institutions":[{"id":"https://openalex.org/I25846049","display_name":"National Tsing Hua University","ror":"https://ror.org/00zdnkx70","country_code":"TW","type":"education","lineage":["https://openalex.org/I25846049"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Yu-Tang Tai","raw_affiliation_strings":["National Tsing Hua University, Taiwan, R.O.C","National Tsing Hua University, Taiwan, R. O. C.#TAB#"],"affiliations":[{"raw_affiliation_string":"National Tsing Hua University, Taiwan, R.O.C","institution_ids":["https://openalex.org/I25846049"]},{"raw_affiliation_string":"National Tsing Hua University, Taiwan, R. O. C.#TAB#","institution_ids":["https://openalex.org/I25846049"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102148020","display_name":"Shih-Chieh Chang","orcid":null},"institutions":[{"id":"https://openalex.org/I25846049","display_name":"National Tsing Hua University","ror":"https://ror.org/00zdnkx70","country_code":"TW","type":"education","lineage":["https://openalex.org/I25846049"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Shih-Chieh Chang","raw_affiliation_strings":["National Tsing Hua University, Taiwan, R.O.C","National Tsing Hua University, Taiwan, R. O. C.#TAB#"],"affiliations":[{"raw_affiliation_string":"National Tsing Hua University, Taiwan, R.O.C","institution_ids":["https://openalex.org/I25846049"]},{"raw_affiliation_string":"National Tsing Hua University, Taiwan, R. O. C.#TAB#","institution_ids":["https://openalex.org/I25846049"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5019119010"],"corresponding_institution_ids":["https://openalex.org/I25846049"],"apc_list":null,"apc_paid":null,"fwci":1.5913,"has_fulltext":false,"cited_by_count":17,"citation_normalized_percentile":{"value":0.83370012,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"11","last_page":"16"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9952999949455261,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11269","display_name":"Algorithms and Data Compression","score":0.9883000254631042,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8353219628334045},{"id":"https://openalex.org/keywords/string-searching-algorithm","display_name":"String searching algorithm","score":0.652027428150177},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.6243655681610107},{"id":"https://openalex.org/keywords/reduction","display_name":"Reduction (mathematics)","score":0.598703145980835},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.5204001665115356},{"id":"https://openalex.org/keywords/memory-architecture","display_name":"Memory architecture","score":0.5177201628684998},{"id":"https://openalex.org/keywords/memory-management","display_name":"Memory management","score":0.5070037841796875},{"id":"https://openalex.org/keywords/pattern-matching","display_name":"Pattern matching","score":0.47895342111587524},{"id":"https://openalex.org/keywords/throughput","display_name":"Throughput","score":0.4644019603729248},{"id":"https://openalex.org/keywords/parallel-computing","display_name":"Parallel computing","score":0.45288586616516113},{"id":"https://openalex.org/keywords/matching","display_name":"Matching (statistics)","score":0.44843900203704834},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.4354832172393799},{"id":"https://openalex.org/keywords/computer-engineering","display_name":"Computer engineering","score":0.3206791877746582},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.22266560792922974},{"id":"https://openalex.org/keywords/semiconductor-memory","display_name":"Semiconductor memory","score":0.163164883852005},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.10716649889945984},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.07754385471343994}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8353219628334045},{"id":"https://openalex.org/C7757238","wikidata":"https://www.wikidata.org/wiki/Q374040","display_name":"String searching algorithm","level":3,"score":0.652027428150177},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.6243655681610107},{"id":"https://openalex.org/C111335779","wikidata":"https://www.wikidata.org/wiki/Q3454686","display_name":"Reduction (mathematics)","level":2,"score":0.598703145980835},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.5204001665115356},{"id":"https://openalex.org/C2779602883","wikidata":"https://www.wikidata.org/wiki/Q15544750","display_name":"Memory architecture","level":2,"score":0.5177201628684998},{"id":"https://openalex.org/C176649486","wikidata":"https://www.wikidata.org/wiki/Q2308807","display_name":"Memory management","level":3,"score":0.5070037841796875},{"id":"https://openalex.org/C68859911","wikidata":"https://www.wikidata.org/wiki/Q1503724","display_name":"Pattern matching","level":2,"score":0.47895342111587524},{"id":"https://openalex.org/C157764524","wikidata":"https://www.wikidata.org/wiki/Q1383412","display_name":"Throughput","level":3,"score":0.4644019603729248},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.45288586616516113},{"id":"https://openalex.org/C165064840","wikidata":"https://www.wikidata.org/wiki/Q1321061","display_name":"Matching (statistics)","level":2,"score":0.44843900203704834},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.4354832172393799},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.3206791877746582},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.22266560792922974},{"id":"https://openalex.org/C98986596","wikidata":"https://www.wikidata.org/wiki/Q1143031","display_name":"Semiconductor memory","level":2,"score":0.163164883852005},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.10716649889945984},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.07754385471343994},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.0},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.0},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/1323548.1323551","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1323548.1323551","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 3rd ACM/IEEE Symposium on Architecture for networking and communications systems","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.150.3391","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.150.3391","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.cse.wustl.edu/ANCS/2007/papers/p11.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W1674877186","https://openalex.org/W1707172707","https://openalex.org/W1960511147","https://openalex.org/W1976716770","https://openalex.org/W2099290142","https://openalex.org/W2099964107","https://openalex.org/W2106062486","https://openalex.org/W2133560322","https://openalex.org/W2146052712","https://openalex.org/W2149375166","https://openalex.org/W2153102141","https://openalex.org/W2159599528","https://openalex.org/W4247093768"],"related_works":["https://openalex.org/W15130811","https://openalex.org/W3145288231","https://openalex.org/W2371263218","https://openalex.org/W4398785990","https://openalex.org/W2092552144","https://openalex.org/W2354196777","https://openalex.org/W2257399947","https://openalex.org/W2965473297","https://openalex.org/W2377397587","https://openalex.org/W2386564085"],"abstract_inverted_index":{"Due":[0],"to":[1,25,95],"the":[2,9,27,35,66,74,84,108,116],"advantages":[3],"of":[4,30,38,79,127],"easy":[5],"re-configurability":[6],"and":[7,33,50],"scalability,":[8],"memory-based":[10],"string":[11,72],"matching":[12],"architecture":[13],"is":[14,93],"widely":[15],"adopted":[16],"by":[17],"network":[18],"intrusion":[19],"detection":[20],"systems":[21],"(NIDS).":[22],"In":[23,53],"order":[24],"accommodate":[26],"increasing":[28],"number":[29],"attack":[31],"patterns":[32],"meet":[34],"throughput":[36],"requirement":[37],"networks,":[39],"a":[40,46,58],"successful":[41],"NIDS":[42],"system":[43],"must":[44],"have":[45],"memory-efficient":[47,59],"pattern-matching":[48,60],"algorithm":[49,61,76,87,118],"hardware":[51],"design.":[52],"this":[54],"paper,":[55],"we":[56,100,120],"propose":[57],"which":[62],"can":[63,101,121],"significantly":[64],"reduce":[65],"memory":[67,80,97,128],"requirement.":[68],"For":[69,112],"total":[70],"Snort":[71],"patterns,":[73],"new":[75],"achieves":[77],"29%":[78],"reduction":[81,98],"compared":[82],"with":[83],"traditional":[85],"Aho-Corasick":[86],"[5].":[88],"Moreover,":[89],"since":[90],"our":[91],"approach":[92],"orthogonal":[94],"other":[96],"approaches,":[99],"obtain":[102],"substantial":[103],"gain":[104,123],"even":[105],"after":[106,114],"applying":[107,115],"existing":[109],"state-of-the-art":[110],"algorithms.":[111],"example,":[113],"bit-split":[117],"[9],":[119],"still":[122],"an":[124],"additional":[125],"22%":[126],"reduction.":[129]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":2},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
