{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T13:23:07Z","timestamp":1730208187711,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,6]]},"DOI":"10.1109\/cit.2010.120","type":"proceedings-article","created":{"date-parts":[[2010,9,20]],"date-time":"2010-09-20T17:00:03Z","timestamp":1285002003000},"page":"575-581","source":"Crossref","is-referenced-by-count":3,"title":["High Speed NIDS using Dynamic Cluster and Comparator Logic"],"prefix":"10.1109","author":[{"given":"Monis","family":"Akhlaq","sequence":"first","affiliation":[]},{"given":"Faeiz","family":"Alserhani","sequence":"additional","affiliation":[]},{"given":"Ahsan","family":"Subhan","sequence":"additional","affiliation":[]},{"given":"Irfan Ullah","family":"Awan","sequence":"additional","affiliation":[]},{"given":"John","family":"Mellor","sequence":"additional","affiliation":[]},{"given":"Pravin","family":"Mirchandani","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"ProCurve Series 2900 switch2","year":"0","key":"ref10"},{"journal-title":"LAN Traffic V 2","year":"0","key":"ref11"},{"journal-title":"D-ITG V 2 6","year":"0","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-25660-1_24"},{"journal-title":"Proc of Conf on Computing Frontiers","article-title":"SPANIDS: A Scalable Network Intrusion Detection Loadbalancer","year":"2005","author":"schaelicke","key":"ref14"},{"journal-title":"Proc of the Symp on RAID'07","article-title":"The NIDS cluster: Scalable, stateful network intrusion detection on commodity hardware","year":"2007","author":"vallentin","key":"ref15"},{"key":"ref16","first-page":"2435","volume":"31","author":"paxson","year":"1999","journal-title":"Computer Networks the International Journal of Computer and Telecommunications Networking Archive"},{"key":"ref17","first-page":"1","article-title":"On Optimizing Load balancing of Intrusion Detection and Prevention Systems","author":"le","year":"2008","journal-title":"Proceedings of 2008 IEEE INFOCOM Workshops"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/B978-012722442-8\/50016-1"},{"journal-title":"Operational Network Intrusion Detection Resource-Analysis Tradeoffs","year":"2007","author":"dreger","key":"ref19"},{"year":"0","key":"ref4","article-title":"Snort"},{"journal-title":"the proceedings of Twenty Fifth UK Performance Engineering Workshop (UKPEW 2009)","article-title":"Snort Performance Evaluation","year":"2009","author":"alserhani","key":"ref3"},{"article-title":"Snort IDS and IPS Toolkit","year":"2007","author":"baker","key":"ref6"},{"journal-title":"Proc USENIX Hot Security","article-title":"Rethinking Hardware Support for Network Analysis and Intrusion Prevention","year":"2006","author":"paxson","key":"ref5"},{"journal-title":"Linux 2 6","year":"0","key":"ref8"},{"article-title":"Managing Security with Snort and IDS Tools","year":"2004","author":"cox","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-11530-1_4"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/IAS.2009.276"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-11530-1_7"},{"year":"0","key":"ref20","article-title":"Top layer"},{"year":"0","key":"ref22","article-title":"F5 Networks"},{"journal-title":"Proc IEEE Symp Research in Security and Privacy","article-title":"Stateful Intrusion Detection for High-Speed Networks","year":"2002","author":"kruegel","key":"ref21"},{"year":"0","key":"ref23","article-title":"Radware"}],"event":{"name":"2010 IEEE 10th International Conference on Computer and Information Technology (CIT)","start":{"date-parts":[[2010,6,29]]},"location":"Bradford, United Kingdom","end":{"date-parts":[[2010,7,1]]}},"container-title":["2010 10th IEEE International Conference on Computer and Information Technology"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5575291\/5577816\/05578121.pdf?arnumber=5578121","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,18]],"date-time":"2017-03-18T23:04:35Z","timestamp":1489878275000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5578121\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,6]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/cit.2010.120","relation":{},"subject":[],"published":{"date-parts":[[2010,6]]}}}