References
- W Feng, J Hurwitz, H Newman, S Ravot, R Les Cottrell, and O Martin, et al., “Optimizing 10-Gigabit Ethernet for Networks of Workstations, Clusters, and Grids: A Case Study,” Proc. of 2003 ACM/IEEE Conf. on Supercomputing, pp.50–63, Nov. 2003.
- J Hurwitz, and W Feng, “End-to-end Performance of 10-gigabit Ethernet on Commodity Systems,” IEEE Micro, Vol. 24, no. 1, pp. 10–22, 2004.
- G Regnier, S Makineni, R Illikkal, R Iyer, D Minturn, and R Huggaballi, et al., “TCP Onloading for Data Center Servers,” IEEE Computer, Vol.37, no. 11, pp. 46–56, 2004.
- N Binkert, L Hsu, A Saidi, R Dreslinski, A Schultz, and S Reinhardt, et al., “Performance Analysis of System Overheads in TCP/IP Workloads,” Proc. of the 14th international Conference on Parallel Architectures and Compilation Techniques, pp.218–30, Sept. 2005.
- K Park, S Oh, S Kim, and Y Chung, “A Network I/O Architecture for Terminal-Initiated Traffics in a Ubiquitous Service Server,” LNCS, 2008, Vol.5200/2008, pp. 161–70, 2008.
- W Stallings, and L Brown, “Computer Security”, Upper Saddle River, New Jersey: Pearson Education; pp.10–22, 2008.
- H Cho, D Kim, J Kim, Y Doh, and J Jang, “Network Processor based Network Intrusion Detection System,” LNCS, 2004, Vol.3090/2004, pp. 973–82, 2004.
- L Roberts, “Beyond Moore’s Law: Internet Growth Trends,” IEEE Computer, Vol.33, no.1, pp. 117–9, Jan. 2000.
- C Clark, W Lee, D Schimmel, D Contis, M Kone, and A Thomas, “A Hardware Platform for Network Intrusion Detection and Prevention,” Proc. of Third Workshop on Network Processors and Applications(NP3), Vol. 3, pp.99–118, Feb. 2004.
- M Otey, S Parthasarathy, A Ghoting, G Li, S Narravula, and D Panda, “Towards NIC-based Intrusion Detection,” Proc. of the ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp.723–8, Aug. 2003.
- “Network Security- NIC Based Intrusion Detection Systems,” Internet white papers, ftxonline, available from: http://www.ftxonline.com/ network-security--nic-based.html, [Last accessed in 2012].
- W de Bruijn, A Slowinska, K van Reeuwijk, T Hruby, L Xu, and H Bos, “SafeCard: A Gigabit IPS on the Network Card,” Proc of the 8th International Symposium on Recent Advances in Intrusion Detection(RAID), Vol.4219, pp.311–30, Sept. 2006.
- M Roesch, and C Green, “Snort Users Manual,“ Internet white papers, SourceFire, INC, available from: http://www.snort.org [Last accessed on 2011].
- H Bos, and K Huang, “Towards Software-based Signature Detection for Intrusion Prevention on the Network Card,” Proc of the 8th International Symposium on Recent Advances in Intrusion Detection(RAID), Vol. 3858, pp.102–23, Sept. 2005.
- S Singh, C Estan, G Varghese, and S Savage, “Automated Worm Fingerprinting,” Proc. of the 6th Conference on Symposium on Operating Systems Design and Implementation(OSDI), Vol.6, pp. 45–60, Dec. 2004.
- T Ptacek, and T Newsham, “Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection,” Technical report, Secure Networks Inc., pp.1–63, Jan. 1998.
- LSO, Available from: http://en.wikipedia.org/wiki/Large_segment offload [Last accessed on 12012].
- PCI Express Base Specification Rev 1.1, PCI-SIG.
- W Stevens, “TCP/IP Illustrated Volume I: The Protocols”, United States: Addison Wesley; 1994.
- Snort Rules, available from: http://www.snort.org/snort-rules [Last accessed on 2012].
- J Corbet, A Rubini, and G Kroah-Hartman, “Linux Device Drivers”, 3rd Edn, Sebastopol, CA, United States of America: O’Reilly; 2005.
- Virtex-5 LX85T FPGA, available from: http://www.xilinx.com / support/documentation/virtex-5.htm. [Last accessed in 2011]
- Virtex-5 FPGA Embedded Tri-Mode Ethernet MAC User Guide, Xilinx doc., 2008.
- Mplayer-The Movie Player, Available from: http://www.mplayerhq. hu/ [Last accessed on 2012]
- SYN cookies, Available from: http://en.wikipedia.org/wiki/SYN_ cookies [Last accessed on 2012].
- Sniph, “Snot,“ Available from: http://www.sec33.com/sniph/, [Last accessed in 2001].
- S Makineni, R Iyer, P Sarangam, D Newell, L Zhao, and R Illikkal, “Receive Side Coalescing for Accelerating TCP/IP Processing,” Proc. of High Performance Computing(HiPC), Vol.4297 pp. 289–300, Dec. 2006.