{"id":"https://openalex.org/W7110326952","doi":"https://doi.org/10.1145/3721462.3770768","title":"PAMO: Pattern Matching Offload for Intrusion Detection Systems","display_name":"PAMO: Pattern Matching Offload for Intrusion Detection Systems","publication_year":2025,"publication_date":"2025-12-08","ids":{"openalex":"https://openalex.org/W7110326952","doi":"https://doi.org/10.1145/3721462.3770768"},"language":"en","primary_location":{"id":"doi:10.1145/3721462.3770768","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3721462.3770768","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 26th International Middleware Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1145/3721462.3770768","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Luk\u00e1\u0161 \u0160i\u0161mi\u0161","orcid":"https://orcid.org/0000-0002-0685-2816"},"institutions":[{"id":"https://openalex.org/I54634078","display_name":"CESNET, z\u00e1jmov\u00e9 sdru\u017een\u00ed pr\u00e1vnick\u00fdch osob","ror":"https://ror.org/050dkka69","country_code":"CZ","type":"other","lineage":["https://openalex.org/I54634078"]}],"countries":["CZ"],"is_corresponding":true,"raw_author_name":"Luk\u00e1\u0161 \u0160i\u0161mi\u0161","raw_affiliation_strings":["CESNET, BUT FIT, Brno, Czech Republic"],"raw_orcid":"https://orcid.org/0000-0002-0685-2816","affiliations":[{"raw_affiliation_string":"CESNET, BUT FIT, Brno, Czech Republic","institution_ids":["https://openalex.org/I54634078"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Colin Evrard","orcid":"https://orcid.org/0009-0008-4400-3509"},"institutions":[{"id":"https://openalex.org/I95674353","display_name":"UCLouvain","ror":"https://ror.org/02495e989","country_code":"BE","type":"education","lineage":["https://openalex.org/I95674353"]}],"countries":["BE"],"is_corresponding":false,"raw_author_name":"Colin Evrard","raw_affiliation_strings":["UCLouvain, Louvain-la-Neuve, Belgium"],"raw_orcid":"https://orcid.org/0009-0008-4400-3509","affiliations":[{"raw_affiliation_string":"UCLouvain, Louvain-la-Neuve, Belgium","institution_ids":["https://openalex.org/I95674353"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Etienne Rivi\u00e8re","orcid":"https://orcid.org/0000-0002-4133-394X"},"institutions":[{"id":"https://openalex.org/I95674353","display_name":"UCLouvain","ror":"https://ror.org/02495e989","country_code":"BE","type":"education","lineage":["https://openalex.org/I95674353"]}],"countries":["BE"],"is_corresponding":false,"raw_author_name":"Etienne Rivi\u00e8re","raw_affiliation_strings":["UCLouvain, Louvain-la-Neuve, Belgium"],"raw_orcid":"https://orcid.org/0000-0002-4133-394X","affiliations":[{"raw_affiliation_string":"UCLouvain, Louvain-la-Neuve, Belgium","institution_ids":["https://openalex.org/I95674353"]}]},{"author_position":"last","author":{"id":null,"display_name":"Tom Barbette","orcid":"https://orcid.org/0000-0003-1269-2190"},"institutions":[{"id":"https://openalex.org/I95674353","display_name":"UCLouvain","ror":"https://ror.org/02495e989","country_code":"BE","type":"education","lineage":["https://openalex.org/I95674353"]}],"countries":["BE"],"is_corresponding":false,"raw_author_name":"Tom Barbette","raw_affiliation_strings":["UCLouvain, Louvain-la-Neuve, Belgium"],"raw_orcid":"https://orcid.org/0000-0003-1269-2190","affiliations":[{"raw_affiliation_string":"UCLouvain, Louvain-la-Neuve, Belgium","institution_ids":["https://openalex.org/I95674353"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I54634078"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.61686375,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"140","last_page":"152"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.9523000121116638,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.9523000121116638,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.03929999843239784,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.000699999975040555,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7950000166893005},{"id":"https://openalex.org/keywords/matching","display_name":"Matching (statistics)","score":0.6013000011444092},{"id":"https://openalex.org/keywords/pattern-matching","display_name":"Pattern matching","score":0.5525000095367432},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.5370000004768372},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.39730000495910645},{"id":"https://openalex.org/keywords/core","display_name":"Core (optical fiber)","score":0.39660000801086426},{"id":"https://openalex.org/keywords/anomaly-based-intrusion-detection-system","display_name":"Anomaly-based intrusion detection system","score":0.3813000023365021},{"id":"https://openalex.org/keywords/computational-complexity-theory","display_name":"Computational complexity theory","score":0.37220001220703125}],"concepts":[{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7950000166893005},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7056000232696533},{"id":"https://openalex.org/C165064840","wikidata":"https://www.wikidata.org/wiki/Q1321061","display_name":"Matching (statistics)","level":2,"score":0.6013000011444092},{"id":"https://openalex.org/C68859911","wikidata":"https://www.wikidata.org/wiki/Q1503724","display_name":"Pattern matching","level":2,"score":0.5525000095367432},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.5370000004768372},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.4207000136375427},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4138000011444092},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.40959998965263367},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.39730000495910645},{"id":"https://openalex.org/C2164484","wikidata":"https://www.wikidata.org/wiki/Q5170150","display_name":"Core (optical fiber)","level":2,"score":0.39660000801086426},{"id":"https://openalex.org/C137524506","wikidata":"https://www.wikidata.org/wiki/Q2247688","display_name":"Anomaly-based intrusion detection system","level":3,"score":0.3813000023365021},{"id":"https://openalex.org/C179799912","wikidata":"https://www.wikidata.org/wiki/Q205084","display_name":"Computational complexity theory","level":2,"score":0.37220001220703125},{"id":"https://openalex.org/C99844830","wikidata":"https://www.wikidata.org/wiki/Q102441924","display_name":"Scaling","level":2,"score":0.36730000376701355},{"id":"https://openalex.org/C90936777","wikidata":"https://www.wikidata.org/wiki/Q917189","display_name":"Host-based intrusion detection system","level":4,"score":0.36469998955726624},{"id":"https://openalex.org/C158251709","wikidata":"https://www.wikidata.org/wiki/Q354025","display_name":"Intrusion","level":2,"score":0.3433000147342682},{"id":"https://openalex.org/C27061796","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion prevention system","level":3,"score":0.3328999876976013},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3246000111103058},{"id":"https://openalex.org/C111335779","wikidata":"https://www.wikidata.org/wiki/Q3454686","display_name":"Reduction (mathematics)","level":2,"score":0.30820000171661377},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.2865000069141388},{"id":"https://openalex.org/C49154492","wikidata":"https://www.wikidata.org/wiki/Q5300","display_name":"Central processing unit","level":2,"score":0.2718000113964081},{"id":"https://openalex.org/C61455927","wikidata":"https://www.wikidata.org/wiki/Q1030529","display_name":"Blossom algorithm","level":3,"score":0.2574999928474426},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.25459998846054077},{"id":"https://openalex.org/C114809511","wikidata":"https://www.wikidata.org/wiki/Q1412924","display_name":"Flow network","level":2,"score":0.25049999356269836}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3721462.3770768","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3721462.3770768","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 26th International Middleware Conference","raw_type":"proceedings-article"},{"id":"pmh:oai:dial.uclouvain.be:boreal:307220","is_oa":true,"landing_page_url":"http://hdl.handle.net/2078.1/307220","pdf_url":null,"source":{"id":"https://openalex.org/S4306401902","display_name":"Digital Access to Libraries (Universit\u00e9 catholique de Louvain (UCL), l'Universit\u00e9 de Namur (UNamur) and the Universit\u00e9 Saint-Louis (USL-B))","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I95674353","host_organization_name":"UCLouvain","host_organization_lineage":["https://openalex.org/I95674353"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"info:eu-repo/semantics/conferenceObject"}],"best_oa_location":{"id":"doi:10.1145/3721462.3770768","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3721462.3770768","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 26th International Middleware Conference","raw_type":"proceedings-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.45264095067977905}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":3,"referenced_works":["https://openalex.org/W1979964565","https://openalex.org/W4247093768","https://openalex.org/W4404479770"],"related_works":[],"abstract_inverted_index":{"Intrusion":[0],"Detection":[1],"Systems":[2],"(IDS)":[3],"play":[4],"a":[5,26,43,49,54,59,85],"crucial":[6],"role":[7],"in":[8,16,25],"network":[9,17,63],"security.":[10],"An":[11],"IDS":[12,78],"recognizes":[13],"malicious":[14],"activity":[15],"traffic":[18,64],"by":[19],"matching":[20],"it":[21],"against":[22],"patterns":[23],"defined":[24],"set":[27],"of":[28,34,62,74],"rules.":[29],"The":[30],"complexity":[31],"and":[32,67],"size":[33],"rule":[35,68],"sets":[36],"lead":[37],"to":[38,58,79],"substantial":[39],"computational":[40],"load.":[41],"In":[42],"state-of-the-art":[44],"IDS,":[45],"such":[46],"as":[47],"Suricata,":[48],"single":[50],"CPU":[51,75],"core":[52],"processes":[53],"few":[55,60],"hundred":[56],"MB":[57],"GB":[61],"per":[65],"second,":[66],"evaluation":[69],"accounts":[70],"for":[71],"over":[72],"60%":[73],"consumption.":[76],"Scaling":[77],"today's":[80],"high-speed":[81],"networks":[82],"is,":[83],"therefore,":[84],"significant":[86],"challenge.":[87]},"counts_by_year":[],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-12-08T00:00:00"}
