Accelerating Pattern Matching Using a Novel Multi-Pattern-Matching Algorithm on GPU

Nowadays, almost all network traffic is encrypted. Attackers hide themselves using this traffic and attack over encrypted channels. Inspections performed only on packet headers and metadata are insufficient for detecting cyberattacks over encrypted channels. Therefore, it is important to analyze pac...

Full description

Saved in:
Bibliographic Details
Published inApplied sciences Vol. 13; no. 14; p. 8104
Main Authors Çelebi, Merve, Yavanoğlu, Uraz
Format Journal Article
LanguageEnglish
Published Basel MDPI AG 01.07.2023
Subjects
Online AccessGet full text
ISSN2076-3417
2076-3417
DOI10.3390/app13148104

Cover

Abstract Nowadays, almost all network traffic is encrypted. Attackers hide themselves using this traffic and attack over encrypted channels. Inspections performed only on packet headers and metadata are insufficient for detecting cyberattacks over encrypted channels. Therefore, it is important to analyze packet contents in applications that require control over payloads, such as content filtering, intrusion detection systems (IDSs), data loss prevention systems (DLPs), and fraud detection. This technology, known as deep packet inspection (DPI), provides full control over the communication between two end stations by keenly analyzing the network traffic. This study proposes a multi-pattern-matching algorithm that reduces the memory space and time required in the DPI pattern matching compared to traditional automaton-based algorithms with its ability to process more than one packet payload character at once. The pattern-matching process in the DPI system created to evaluate the performance of the proposed algorithm (PA) is conducted on the graphics processing unit (GPU), which accelerates the processing of network packets with its parallel computing capability. This study compares the PA with the Aho-Corasick (AC) and Wu–Manber (WM) algorithms, which are widely used in the pattern-matching process, considering the memory space required and throughput obtained. Algorithm tables created with a dataset containing 500 patterns use 425 and 688 times less memory space than those of the AC and WM algorithms, respectively. In the pattern-matching process using these tables, the PA is 3.5 and 1.5 times more efficient than the AC and WM algorithms, respectively.
AbstractList Nowadays, almost all network traffic is encrypted. Attackers hide themselves using this traffic and attack over encrypted channels. Inspections performed only on packet headers and metadata are insufficient for detecting cyberattacks over encrypted channels. Therefore, it is important to analyze packet contents in applications that require control over payloads, such as content filtering, intrusion detection systems (IDSs), data loss prevention systems (DLPs), and fraud detection. This technology, known as deep packet inspection (DPI), provides full control over the communication between two end stations by keenly analyzing the network traffic. This study proposes a multi-pattern-matching algorithm that reduces the memory space and time required in the DPI pattern matching compared to traditional automaton-based algorithms with its ability to process more than one packet payload character at once. The pattern-matching process in the DPI system created to evaluate the performance of the proposed algorithm (PA) is conducted on the graphics processing unit (GPU), which accelerates the processing of network packets with its parallel computing capability. This study compares the PA with the Aho-Corasick (AC) and Wu–Manber (WM) algorithms, which are widely used in the pattern-matching process, considering the memory space required and throughput obtained. Algorithm tables created with a dataset containing 500 patterns use 425 and 688 times less memory space than those of the AC and WM algorithms, respectively. In the pattern-matching process using these tables, the PA is 3.5 and 1.5 times more efficient than the AC and WM algorithms, respectively.
Audience Academic
Author Yavanoğlu, Uraz
Çelebi, Merve
Author_xml – sequence: 1
  givenname: Merve
  surname: Çelebi
  fullname: Çelebi, Merve
– sequence: 2
  givenname: Uraz
  surname: Yavanoğlu
  fullname: Yavanoğlu, Uraz
BookMark eNp9kV1rFDEUhoNUsNZe-QcGvNSp-Z7M5VK0Ftpa0L0OZ_KxzTKbjJms0n9vtlNKEWwCSTh53jcn57xFRzFFh9B7gs8Y6_FnmCbCCFcE81fomOJOtoyT7ujZ-Q06nectrqMnrILH6MfKGDe6DCXETXMLpbgcm2so5u4QWM-HFZqb9NuNzfV-LKF9hNonaDVuUg7lbtek2Fzcrt-h1x7G2Z0-7ido_fXLz_Nv7dX3i8vz1VVrOGalFZJR7pVlZuiEGDyllkuvQFAKVrLeA-XGguTEOoH9MAhDMOnkABbbesVO0OXiaxNs9ZTDDvK9ThD0QyDljYZcghmdVh1XgwSBqeLccToYYXtFQAIZOmy76vVp8drHCe7_wDg-GRKsD_XVz-pb8Q8LPuX0a-_mordpn2P9ra4v0F5SJQ7U2UJtoOYQok8lg6nTul0wtXs-1PiqE0oJ2T0IyCIwOc1zdl6bUGprUqzCMP4nlY__aF5K_C9dR6ik
CitedBy_id crossref_primary_10_1049_ise2_5523834
crossref_primary_10_4018_IJDST_341269
Cites_doi 10.1109/LCOMM.2016.2601898
10.1007/s11227-018-2517-0
10.1109/NTICT.2017.7976111
10.1016/j.mejo.2015.08.002
10.1109/COMST.2016.2566669
10.1371/journal.pone.0139301
10.1007/s11042-019-07822-8
10.1109/ICC.2016.7510811
10.1109/LCOMM.2006.1603387
10.1109/TVLSI.2017.2753843
10.2139/ssrn.4072552
10.1049/iet-ifs.2017.0421
10.1109/ISPASS.2009.4919649
10.1109/SURV.2013.100613.00161
10.14257/ijfgcn.2016.9.9.15
10.1109/ISDA.2012.6416511
10.3390/app7101082
10.1109/90.851975
10.1109/ASAP.2009.16
10.17706/jcp.12.2.183-189
10.1109/INDICON49873.2020.9342041
10.1109/TNET.2020.3016785
10.1109/TC.2012.254
10.1109/PCCC.2009.5403809
10.1145/359842.359859
10.1109/ICICISYS.2010.5658784
10.1145/2674005.2674994
10.1109/BigDataService.2018.00044
10.1109/GLOCOM.2007.8
10.1002/0470099747
10.1145/2881025.2881034
10.1145/3033288.3033346
10.1007/s10922-021-09589-6
10.1007/s10009-019-00520-8
10.1109/TNET.2012.2224881
10.1016/j.jpdc.2015.11.001
10.1016/j.adhoc.2013.04.014
10.1145/1839667.1839672
10.1016/j.matpr.2021.04.028
10.1109/ICACCI.2014.6968595
10.1007/s11227-018-2685-y
10.1109/ICRAIE.2016.7939534
10.1016/j.jnca.2012.07.010
10.1145/362686.362692
10.1147/rd.312.0249
10.1145/360825.360855
10.1109/ACCESS.2021.3074801
ContentType Journal Article
Copyright COPYRIGHT 2023 MDPI AG
2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Copyright_xml – notice: COPYRIGHT 2023 MDPI AG
– notice: 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
DBID AAYXX
CITATION
ABUWG
AFKRA
AZQEC
BENPR
CCPQU
DWQXO
PHGZM
PHGZT
PIMPY
PKEHL
PQEST
PQQKQ
PQUKI
PRINS
ADTOC
UNPAY
DOA
DOI 10.3390/app13148104
DatabaseName CrossRef
ProQuest Central (Alumni)
ProQuest Central UK/Ireland
ProQuest Central Essentials
ProQuest Central
ProQuest One Community College
ProQuest Central Korea
Proquest Central Premium
ProQuest One Academic
Publicly Available Content Database
ProQuest One Academic Middle East (New)
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Academic
ProQuest One Academic UKI Edition
ProQuest Central China
Unpaywall for CDI: Periodical Content
Unpaywall
DOAJ Directory of Open Access Journals
DatabaseTitle CrossRef
Publicly Available Content Database
ProQuest One Academic Middle East (New)
ProQuest Central Essentials
ProQuest One Academic Eastern Edition
ProQuest Central (Alumni Edition)
ProQuest One Community College
ProQuest Central China
ProQuest Central
ProQuest One Academic UKI Edition
ProQuest Central Korea
ProQuest Central (New)
ProQuest One Academic
ProQuest One Academic (New)
DatabaseTitleList
Publicly Available Content Database

CrossRef
Database_xml – sequence: 1
  dbid: DOA
  name: DOAJ Directory of Open Access Journals
  url: https://www.doaj.org/
  sourceTypes: Open Website
– sequence: 2
  dbid: UNPAY
  name: Unpaywall
  url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/
  sourceTypes: Open Access Repository
– sequence: 3
  dbid: BENPR
  name: ProQuest Central
  url: http://www.proquest.com/pqcentral?accountid=15518
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Sciences (General)
EISSN 2076-3417
ExternalDocumentID oai_doaj_org_article_8748b6a502844e42bc5d981a6a1b70d7
10.3390/app13148104
A758856754
10_3390_app13148104
GeographicLocations Germany
GeographicLocations_xml – name: Germany
GroupedDBID .4S
2XV
5VS
7XC
8CJ
8FE
8FG
8FH
AADQD
AAFWJ
AAYXX
ADBBV
ADMLS
AFKRA
AFPKN
AFZYC
ALMA_UNASSIGNED_HOLDINGS
APEBS
ARCSS
BCNDV
BENPR
CCPQU
CITATION
CZ9
D1I
D1J
D1K
GROUPED_DOAJ
IAO
IGS
ITC
K6-
K6V
KC.
KQ8
L6V
LK5
LK8
M7R
MODMG
M~E
OK1
P62
PHGZM
PHGZT
PIMPY
PROAC
TUS
ABUWG
AZQEC
DWQXO
PKEHL
PQEST
PQQKQ
PQUKI
PRINS
ADTOC
IPNFZ
RIG
UNPAY
ID FETCH-LOGICAL-c403t-56324f8d3cb755bf22d46f8a522ad639fa24cda641de50fbb5c10176bad0d24c3
IEDL.DBID BENPR
ISSN 2076-3417
IngestDate Fri Oct 03 12:45:26 EDT 2025
Sun Oct 26 03:28:15 EDT 2025
Mon Jun 30 05:09:24 EDT 2025
Mon Oct 20 17:19:33 EDT 2025
Thu Oct 16 04:36:19 EDT 2025
Thu Apr 24 23:04:46 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 14
Language English
License cc-by
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c403t-56324f8d3cb755bf22d46f8a522ad639fa24cda641de50fbb5c10176bad0d24c3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
OpenAccessLink https://www.proquest.com/docview/2842962854?pq-origsite=%requestingapplication%&accountid=15518
PQID 2842962854
PQPubID 2032433
ParticipantIDs doaj_primary_oai_doaj_org_article_8748b6a502844e42bc5d981a6a1b70d7
unpaywall_primary_10_3390_app13148104
proquest_journals_2842962854
gale_infotracacademiconefile_A758856754
crossref_citationtrail_10_3390_app13148104
crossref_primary_10_3390_app13148104
PublicationCentury 2000
PublicationDate 2023-07-01
PublicationDateYYYYMMDD 2023-07-01
PublicationDate_xml – month: 07
  year: 2023
  text: 2023-07-01
  day: 01
PublicationDecade 2020
PublicationPlace Basel
PublicationPlace_xml – name: Basel
PublicationTitle Applied sciences
PublicationYear 2023
Publisher MDPI AG
Publisher_xml – name: MDPI AG
References Lee (ref_56) 2012; 21
Ahmadi (ref_27) 2016; 20
Otoum (ref_33) 2021; 29
Roesch (ref_46) 1991; 99
ref_14
ref_13
ref_10
ref_54
ref_53
ref_52
ref_51
Xu (ref_4) 2016; 18
Ho (ref_72) 2018; 12
ref_19
ref_16
ref_59
Sharma (ref_36) 2016; 9
Kim (ref_62) 2015; 46
Pao (ref_55) 2010; 7
ref_61
Aldwairi (ref_39) 2016; 11
Rahman (ref_32) 2017; 12
Yin (ref_48) 2019; 75
ref_69
ref_24
ref_68
ref_67
ref_22
ref_66
ref_21
ref_20
ref_64
ref_63
ref_28
Ahmadi (ref_23) 2017; 7
ref_26
Chen (ref_57) 2013; 10
ref_71
Kocak (ref_25) 2006; 10
(ref_60) 2021; 9
ref_35
ref_34
Antonello (ref_5) 2012; 35
ref_31
ref_30
Bloom (ref_17) 1970; 13
Nagaraju (ref_50) 2021; 47
ref_73
ref_38
ref_37
Bulut (ref_41) 2023; 38
Finsterbusch (ref_11) 2013; 16
Havlena (ref_45) 2020; 22
Aho (ref_9) 1975; 18
Sun (ref_49) 2019; 75
Shoaib (ref_15) 2017; 8
ref_47
Boyer (ref_29) 1977; 20
ref_44
Zhang (ref_40) 2020; 79
ref_43
ref_42
ref_1
Wang (ref_58) 2017; 26
ref_3
Lin (ref_70) 2012; 62
Raza (ref_2) 2013; 11
Han (ref_65) 2020; 28
Hsieh (ref_7) 2016; 88
ref_8
Fan (ref_18) 2000; 8
Karp (ref_12) 1987; 31
ref_6
References_xml – volume: 20
  start-page: 2217
  year: 2016
  ident: ref_27
  article-title: Deep packet inspection using quotient filter
  publication-title: IEEE Commun. Lett.
  doi: 10.1109/LCOMM.2016.2601898
– volume: 75
  start-page: 3317
  year: 2019
  ident: ref_49
  article-title: An improved method in deep packet inspection based on regular expression
  publication-title: J. Supercomput.
  doi: 10.1007/s11227-018-2517-0
– ident: ref_28
  doi: 10.1109/NTICT.2017.7976111
– volume: 46
  start-page: 950
  year: 2015
  ident: ref_62
  article-title: A scalable architecture for reducing power consumption in pipelined deep packet inspection system
  publication-title: Microelectron. J.
  doi: 10.1016/j.mejo.2015.08.002
– volume: 18
  start-page: 2991
  year: 2016
  ident: ref_4
  article-title: A survey on regular expression matching for deep packet inspection: Applications, algorithms, and hardware platforms
  publication-title: IEEE Commun. Surv. Tutor.
  doi: 10.1109/COMST.2016.2566669
– ident: ref_6
  doi: 10.1371/journal.pone.0139301
– volume: 79
  start-page: 16245
  year: 2020
  ident: ref_40
  article-title: XWM: A high-speed matching algorithm for large-scale URL rules in wireless surveillance applications
  publication-title: Multimed. Tools Appl.
  doi: 10.1007/s11042-019-07822-8
– volume: 11
  start-page: 5
  year: 2016
  ident: ref_39
  article-title: Bloom filters optimized Wu-Manber for intrusion detection
  publication-title: J. Digit. Forensics Secur. Law
– ident: ref_68
– ident: ref_3
  doi: 10.1109/ICC.2016.7510811
– volume: 10
  start-page: 210
  year: 2006
  ident: ref_25
  article-title: Low-power bloom filter architecture for deep packet inspection
  publication-title: IEEE Commun. Lett.
  doi: 10.1109/LCOMM.2006.1603387
– ident: ref_42
– volume: 26
  start-page: 143
  year: 2017
  ident: ref_58
  article-title: Memory-based architecture for multicharacter Aho–Corasick string matching
  publication-title: IEEE Trans. Very Large Scale İntegr. VLSI Syst.
  doi: 10.1109/TVLSI.2017.2753843
– ident: ref_35
– ident: ref_61
  doi: 10.2139/ssrn.4072552
– volume: 12
  start-page: 381
  year: 2018
  ident: ref_72
  article-title: Parallel multiple pattern matching schemes based on cuckoo filter for deep packet inspection on graphics processing units
  publication-title: IET Inf. Secur.
  doi: 10.1049/iet-ifs.2017.0421
– ident: ref_66
  doi: 10.1109/ISPASS.2009.4919649
– volume: 16
  start-page: 1135
  year: 2013
  ident: ref_11
  article-title: A survey of payload-based traffic classification approaches
  publication-title: IEEE Commun. Surv. Tutor.
  doi: 10.1109/SURV.2013.100613.00161
– volume: 9
  start-page: 169
  year: 2016
  ident: ref_36
  article-title: Single Digit Hash Boyer Moore Horspool Pattern Matching Algorithm for Intrusion Detection System
  publication-title: Int. J. Future Gener. Commun. Netw.
  doi: 10.14257/ijfgcn.2016.9.9.15
– ident: ref_30
  doi: 10.1109/ISDA.2012.6416511
– ident: ref_1
  doi: 10.3390/app7101082
– volume: 8
  start-page: 281
  year: 2000
  ident: ref_18
  article-title: Summary cache: A scalable wide-area web cache sharing protocol
  publication-title: IEEE/ACM Trans. Netw.
  doi: 10.1109/90.851975
– ident: ref_8
  doi: 10.1109/ASAP.2009.16
– ident: ref_52
– volume: 12
  start-page: 183
  year: 2017
  ident: ref_32
  article-title: SQL Injection Attack Scanner Using Boyer-Moore String Matching Algorithm
  publication-title: J. Comput.
  doi: 10.17706/jcp.12.2.183-189
– ident: ref_59
  doi: 10.1109/INDICON49873.2020.9342041
– ident: ref_69
– ident: ref_10
– volume: 28
  start-page: 2727
  year: 2020
  ident: ref_65
  article-title: A secure middlebox framework for enabling visibility over multiple encryption protocols
  publication-title: IEEE/ACM Trans. Netw.
  doi: 10.1109/TNET.2020.3016785
– volume: 62
  start-page: 1906
  year: 2012
  ident: ref_70
  article-title: Accelerating pattern matching using a novel parallel algorithm on GPUs
  publication-title: IEEE Trans. Comput.
  doi: 10.1109/TC.2012.254
– volume: 38
  start-page: 875
  year: 2023
  ident: ref_41
  article-title: Q-gram hash comparison based multiple exact string matching algorithm for DNA sequences
  publication-title: J. Fac. Eng. Archit. Gazi Univ.
– ident: ref_13
– ident: ref_38
– ident: ref_67
  doi: 10.1109/PCCC.2009.5403809
– volume: 8
  start-page: 081128
  year: 2017
  ident: ref_15
  article-title: GDPI: Signature based deep packet inspection using GPUs
  publication-title: Int. J. Adv. Comput. Sci. Appl.
– volume: 20
  start-page: 762
  year: 1977
  ident: ref_29
  article-title: A fast string searching algorithm
  publication-title: Commun. ACM
  doi: 10.1145/359842.359859
– ident: ref_20
– ident: ref_37
  doi: 10.1109/ICICISYS.2010.5658784
– volume: 7
  start-page: 346
  year: 2017
  ident: ref_23
  article-title: Qcf for deep packet inspection
  publication-title: IET Netw.
– ident: ref_53
– ident: ref_22
  doi: 10.1145/2674005.2674994
– ident: ref_24
– ident: ref_34
– ident: ref_16
  doi: 10.1109/BigDataService.2018.00044
– ident: ref_26
  doi: 10.1109/GLOCOM.2007.8
– ident: ref_73
  doi: 10.1002/0470099747
– ident: ref_47
– ident: ref_51
  doi: 10.1145/2881025.2881034
– volume: 10
  start-page: 1
  year: 2013
  ident: ref_57
  article-title: An efficient multicharacter transition string-matching engine based on the aho-corasick algorithm
  publication-title: ACM Trans. Archit. Code Optim.
– ident: ref_71
  doi: 10.1145/3033288.3033346
– volume: 29
  start-page: 23
  year: 2021
  ident: ref_33
  article-title: As-ids: Anomaly and signature based ids for the internet of things
  publication-title: J. Netw. Syst. Manag.
  doi: 10.1007/s10922-021-09589-6
– volume: 22
  start-page: 523
  year: 2020
  ident: ref_45
  article-title: Approximate reduction of finite automata for high-speed network intrusion detection
  publication-title: Int. J. Softw. Tools Technol. Transf.
  doi: 10.1007/s10009-019-00520-8
– volume: 21
  start-page: 1104
  year: 2012
  ident: ref_56
  article-title: A pattern-matching scheme with high throughput performance and low memory requirement
  publication-title: IEEE/ACM Trans. Netw.
  doi: 10.1109/TNET.2012.2224881
– volume: 88
  start-page: 46
  year: 2016
  ident: ref_7
  article-title: A high-throughput DPI engine on GPU via algorithm/implementation co-optimization
  publication-title: J. Parallel Distrib. Comput.
  doi: 10.1016/j.jpdc.2015.11.001
– volume: 11
  start-page: 2661
  year: 2013
  ident: ref_2
  article-title: SVELTE: Real-time intrusion detection in the Internet of Things
  publication-title: Ad Hoc Netw.
  doi: 10.1016/j.adhoc.2013.04.014
– ident: ref_63
– ident: ref_44
– ident: ref_21
– volume: 7
  start-page: 1
  year: 2010
  ident: ref_55
  article-title: A memory-efficient pipelined implementation of the aho-corasick string-matching algorithm
  publication-title: ACM Trans. Archit. Code Optim.
  doi: 10.1145/1839667.1839672
– volume: 47
  start-page: 139
  year: 2021
  ident: ref_50
  article-title: High throughput token driven FSM based regex pattern matching for network intrusion detection system
  publication-title: Mater. Today Proc.
  doi: 10.1016/j.matpr.2021.04.028
– ident: ref_14
  doi: 10.1109/ICACCI.2014.6968595
– ident: ref_54
– volume: 75
  start-page: 4295
  year: 2019
  ident: ref_48
  article-title: Improved deep packet inspection in data stream detection
  publication-title: J. Supercomput.
  doi: 10.1007/s11227-018-2685-y
– volume: 99
  start-page: 229
  year: 1991
  ident: ref_46
  article-title: Snort: Lightweight intrusion detection for networks
  publication-title: Lisa
– ident: ref_31
  doi: 10.1109/ICRAIE.2016.7939534
– volume: 35
  start-page: 1863
  year: 2012
  ident: ref_5
  article-title: Deep packet inspection tools and techniques in commodity platforms: Challenges and trends
  publication-title: J. Netw. Comput. Appl.
  doi: 10.1016/j.jnca.2012.07.010
– ident: ref_64
– volume: 13
  start-page: 422
  year: 1970
  ident: ref_17
  article-title: Space/time trade-offs in hash coding with allowable errors
  publication-title: Commun. ACM
  doi: 10.1145/362686.362692
– volume: 31
  start-page: 249
  year: 1987
  ident: ref_12
  article-title: Efficient randomized pattern-matching algorithms
  publication-title: IBM J. Res. Dev.
  doi: 10.1147/rd.312.0249
– volume: 18
  start-page: 333
  year: 1975
  ident: ref_9
  article-title: Efficient string matching: An aid to bibliographic search
  publication-title: Commun. ACM
  doi: 10.1145/360825.360855
– ident: ref_19
– ident: ref_43
– volume: 9
  start-page: 62857
  year: 2021
  ident: ref_60
  article-title: Pattern Matching in YARA: Improved Aho-Corasick Algorithm
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2021.3074801
SSID ssj0000913810
Score 2.282843
Snippet Nowadays, almost all network traffic is encrypted. Attackers hide themselves using this traffic and attack over encrypted channels. Inspections performed only...
SourceID doaj
unpaywall
proquest
gale
crossref
SourceType Open Website
Open Access Repository
Aggregation Database
Enrichment Source
Index Database
StartPage 8104
SubjectTerms Algorithms
Analysis
Cost control
Cyberterrorism
deep packet inspection
Field programmable gate arrays
Fraud
Malware
network security
Optimization techniques
pattern matching
Performance evaluation
Security software
Subtitles & subtitling
Technology application
SummonAdditionalLinks – databaseName: DOAJ Directory of Open Access Journals
  dbid: DOA
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV3da9RAEB-kL9oHsVXxtMo-VPyAxWSzu7d5PMVahJaCHvRt2a9UIeZKe1X8753Z7B0BRV98TYZkMh87M9md3wAcNiKp2onIjU6KSyc096qNvGpFSnVKWjvqHT451cdL-fFcnU9GfdGZsBEeeBTcGzOXxmunMA5KmaTwQcXW1E672s-rmPvIK9NOiqm8Brc1QVeNDXkN1vW0H1w3mPvXZSTbJgRlpP7f1-NduH0zXLqfP1zfTwLO0T24WzJFthg53INbadiH3Ql-4D7sFc-8Zi8LfPSr-_BpEQLGEtLscMHOMn7mwE5wyaWfTSyfEWCOna6-p57l_lteiPiWaNFfrK6-rr98Y6uBfThbPoDl0fvP7455GZ3Ag6yaNVeEwt6Z2AQ_V8p3QkSpO-Mw23IRk5LOCRmi07KOSVWd9yqQb2rvYhXxVvMQdobVkB4BwxQsdCpFQZmAoG3VVkSFF9RcOiO6GbzeSNOGgitO4y16i_UFid5ORD-Dwy3x5Qin8Weyt6SWLQlhYOcLaBm2WIb9l2XM4AUp1ZKnIkPBlYYD_CzCvLILLJWMwoIJX3ew0bstLnxt8amizQ2mM3i-tYW_cf34f3D9BO7QRPvxRPAB7KyvbtJTzHvW_lk28V9ySPzB
  priority: 102
  providerName: Directory of Open Access Journals
– databaseName: Unpaywall
  dbid: UNPAY
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV3db9MwELege4A9ABsgOgbywxAfUtbYsR3nCQXEmJBWVYJK4ynyV8pEllRdOgR_PefEqSpACIlX55LYuvP5d_bdzwgdJdRxoqiNpHA8YoqKSPPMRnFGnSPOCaF87fDZVJzO2Ydzfr5Vxe_TKiEUv-icNIUgOwI3m05IMiFsIiF2mCxt-fo67CURITNPCM_5TbQjOKDxEdqZT2f5Z3-n3PB2X5aXQHTvT4VJAhEACRezDQtRx9f_u1feRbfW9VJ9_6aqamvZObmL1NDhPtvk6_G61cfmxy9cjv8zonvoTsCkOO-NaA_dcPU-2t1iKtxHe8EHXOEXgaj65X30MTcGVi1vQ_UCzzqmzhqfgXP321q4y0bACk-ba1fhrtI3CkLRRiivFs3qov1yiZsav5_NH6D5ybtPb0-jcElDZFictBH3fO-ltInRKee6pNQyUUoFuE5ZgD-losxYJRixjsel1tx4LyC0srGFR8lDNKqb2j1CGMCeKbmz1GMO6g9wM2o5NPCUKUnLMXo1aKwwgcHcX6RRFRDJePUWW-odo6ON8LIn7viz2Buv-o2IZ9vuGprVogiTt5Apk1ooDliMMceoNtxmkiihiE5jm47Rc284hfcJ0CGjQmkDDMuzaxU5BGWSQ2gGvzscbKsIzuKqgK_SrCtlHaNnG3v7W68P_lHuMbpNAZT16cWHaNSu1u4JgKhWPw3z5CcBFBNg
  priority: 102
  providerName: Unpaywall
Title Accelerating Pattern Matching Using a Novel Multi-Pattern-Matching Algorithm on GPU
URI https://www.proquest.com/docview/2842962854
https://www.mdpi.com/2076-3417/13/14/8104/pdf?version=1689084855
https://doaj.org/article/8748b6a502844e42bc5d981a6a1b70d7
UnpaywallVersion publishedVersion
Volume 13
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVAFT
  databaseName: Open Access Digital Library
  customDbUrl:
  eissn: 2076-3417
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0000913810
  issn: 2076-3417
  databaseCode: KQ8
  dateStart: 20110101
  isFulltext: true
  titleUrlDefault: http://grweb.coalliance.org/oadl/oadl.html
  providerName: Colorado Alliance of Research Libraries
– providerCode: PRVAON
  databaseName: DOAJ Directory of Open Access Journals
  customDbUrl:
  eissn: 2076-3417
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0000913810
  issn: 2076-3417
  databaseCode: DOA
  dateStart: 20110101
  isFulltext: true
  titleUrlDefault: https://www.doaj.org/
  providerName: Directory of Open Access Journals
– providerCode: PRVEBS
  databaseName: Inspec with Full Text
  customDbUrl:
  eissn: 2076-3417
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0000913810
  issn: 2076-3417
  databaseCode: ADMLS
  dateStart: 20120901
  isFulltext: true
  titleUrlDefault: https://www.ebsco.com/products/research-databases/inspec-full-text
  providerName: EBSCOhost
– providerCode: PRVHPJ
  databaseName: ROAD: Directory of Open Access Scholarly Resources
  customDbUrl:
  eissn: 2076-3417
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0000913810
  issn: 2076-3417
  databaseCode: M~E
  dateStart: 20110101
  isFulltext: true
  titleUrlDefault: https://road.issn.org
  providerName: ISSN International Centre
– providerCode: PRVPQU
  databaseName: ProQuest Central
  customDbUrl: http://www.proquest.com/pqcentral?accountid=15518
  eissn: 2076-3417
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0000913810
  issn: 2076-3417
  databaseCode: BENPR
  dateStart: 20110101
  isFulltext: true
  titleUrlDefault: https://www.proquest.com/central
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: ProQuest Technology Collection
  customDbUrl:
  eissn: 2076-3417
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0000913810
  issn: 2076-3417
  databaseCode: 8FG
  dateStart: 20110101
  isFulltext: true
  titleUrlDefault: https://search.proquest.com/technologycollection1
  providerName: ProQuest
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV3db9MwED9t3QPsAbEBWmFUfhjiQ7JIHNtxHhDK0LoJaVUFVBpPkWM75SEkZetA_Pf4UidUAu0xzikfd77z3dn3O4CThDkRa2apkk5QrpmkpcgsjTLmXOyclBprhy9n8mLBP16Jqx2Y9bUweKyyt4mdobatwRz5W29GWdbV-71f_aDYNQp3V_sWGjq0VrDvOoixXdhjiIw1gr3Ts9n805B1QRRMFUebQr3Ex_u4TxwnPiaIQ6u2fmnqEPz_tdP7cO-2Wenfv3Rdby1E04fwIHiQJN-I_AB2XHMI-1u4godwEDT2hrwKsNKvH8Hn3Bi_xqDEmyWZd7iaDbn0phiTUKQ7O0A0mbU_XU26ulwaiOhAlNdLz5P1t--kbcj5fPEYFtOzLx8uaGipQA2PkjUViM5eKZuYMhWirBizXFZKey9MW--sVJpxY7XksXUiqspSGNRZWWobWX8reQKjpm3cERDvmplKOMvQQ2C43ZoxK_yASLlWrBrDm56bhQl449j2oi583IGsL7ZYP4aTgXi1gdn4P9kpimUgQWzsbqC9XhZB1QqVclVKLbznxLnjrDTCZirWUsdlGtl0DC9RqAVqsP8go0Mhgv8txMIqch9CKeEDKf-6417uRVDtm-LvRBzDi2Eu3PXVT-9-zDO4jz3sN2eAj2G0vr51z72nsy4nsKum55MwiSddvsBfLWbz_OsfW3X_Aw
linkProvider ProQuest
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lb9QwEB6V9lB6QLSAWFrAh1Y8JKuJY2eTQ4W20LKl3dUKulJvwa8shzRZuluq_jl-G-OsE1YC9dZrMnKcmfE8bM83ALsRsyKUzNAktoJyyWKqRGpokDJrQ2vjWLra4cEw7o_5lwtxsQK_m1oYd62ysYm1oTaVdnvk-2hGWVrX-32Y_qSua5Q7XW1aaEjfWsEc1BBjvrDj1N7eYAo3Ozj5hPLeY-z46Pxjn_ouA1TzIJpT4QDL88REWnWFUDljhsd5IjEwkQb9dy4Z10bGPDRWBLlSQjs1jpU0gcFXEY77ANZ4xFNM_tYOj4ajr-0uj0PdTMJgURgYRWngzqXDCHOQ0LeGa1xh3THgX7-wAevX5VTe3siiWHJ8x4_hkY9YSW-hYpuwYsst2FjCMdyCTW8hZuSth7F-9wS-9bRGn-Y0rJyQUY3jWZIBmn636UXquwpEkmH1yxakrgOmnoi2RL1igjKY_7gkVUk-j8ZPYXwvzH0Gq2VV2udAMBTUubCGuYiEuePdlBmBD0SXy4TlHXjfcDPTHt_ctdkoMsxzHOuzJdZ3YLclni5gPf5PdujE0pI4LO76QXU1yfzSzpIuT1QsBUZqnFvOlBYmTUIZy1B1A9PtwBsn1MxZDJyQlr7wAX_LYW9lPUzZEoGJG35up5F75k3JLPur-B3Ya3Xhrlm_uHuY17DePx-cZWcnw9NteMgwalvcP96B1fnVtX2JUdZcvfKqTOD7fa-eP2x5OSc
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lb9QwEB6VIgE9IFpALBTwoRUPKWri2HkcEFoo25bS1UqwUm-pYzvLISRLd0vVv8avYyZxwkqg3npNRo4zHs_DnvkGYCfkVgaKGy-JrPSE4pGXy9R4fsqtDayNIkW1wyfj6HAqPp_K0zX43dXCUFplpxMbRW1qTWfke6hGedrU--0VLi1isj96P__pUQcpumnt2mm0InJsry4xfFu8O9rHtd7lfPTp28dDz3UY8LTww6UnCay8SEyo81jKvODciKhIFDolyqDtLhQX2qhIBMZKv8hzqUmEo1wZ3-CrEMe9BbdjQnGnKvXRQX--Q3ibSeC3JYFhmPp0Ix2EGH0ErilcZwSbXgH_WoQNuHtRzdXVpSrLFZM3egD3na_Khq1wbcKarbZgYwXBcAs2nW5YsNcOwPrNQ_g61BqtGclWNWOTBsGzYieo9Om4izVZCkyxcf3LlqypAPYckdcTDcsZcnz5_QerK3YwmT6C6Y2w9jGsV3VlnwBDJ1AX0hpOvgini92UG4kPZCxUwosBvO24mWmHbE4NNsoMIxxifbbC-gHs9MTzFtDj_2QfaFl6EkLhbh7U57PMbeosiUWSR0qijyaEFTzX0qRJoCIV5LFv4gG8okXNSFfghLRyJQ_4W4S6lQ0xWEskhmz4ue1u3TOnRBbZX5EfwG4vC9fN-un1w7yEO7hnsi9H4-NncI-ju9YmHm_D-vL8wj5H92qZv2jkmMHZTW-cP9hlNsE
linkToUnpaywall http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV3db9MwELege4A9ABsgOgbywxAfUtbYsR3nCQXEmJBWVYJK4ynyV8pEllRdOgR_PefEqSpACIlX55LYuvP5d_bdzwgdJdRxoqiNpHA8YoqKSPPMRnFGnSPOCaF87fDZVJzO2Ydzfr5Vxe_TKiEUv-icNIUgOwI3m05IMiFsIiF2mCxt-fo67CURITNPCM_5TbQjOKDxEdqZT2f5Z3-n3PB2X5aXQHTvT4VJAhEACRezDQtRx9f_u1feRbfW9VJ9_6aqamvZObmL1NDhPtvk6_G61cfmxy9cjv8zonvoTsCkOO-NaA_dcPU-2t1iKtxHe8EHXOEXgaj65X30MTcGVi1vQ_UCzzqmzhqfgXP321q4y0bACk-ba1fhrtI3CkLRRiivFs3qov1yiZsav5_NH6D5ybtPb0-jcElDZFictBH3fO-ltInRKee6pNQyUUoFuE5ZgD-losxYJRixjsel1tx4LyC0srGFR8lDNKqb2j1CGMCeKbmz1GMO6g9wM2o5NPCUKUnLMXo1aKwwgcHcX6RRFRDJePUWW-odo6ON8LIn7viz2Buv-o2IZ9vuGprVogiTt5Apk1ooDliMMceoNtxmkiihiE5jm47Rc284hfcJ0CGjQmkDDMuzaxU5BGWSQ2gGvzscbKsIzuKqgK_SrCtlHaNnG3v7W68P_lHuMbpNAZT16cWHaNSu1u4JgKhWPw3z5CcBFBNg
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Accelerating+Pattern+Matching+Using+a+Novel+Multi-Pattern-Matching+Algorithm+on+GPU&rft.jtitle=Applied+sciences&rft.au=%C3%87elebi%2C+Merve&rft.au=Yavano%C4%9Flu%2C+Uraz&rft.date=2023-07-01&rft.issn=2076-3417&rft.eissn=2076-3417&rft.volume=13&rft.issue=14&rft.spage=8104&rft_id=info:doi/10.3390%2Fapp13148104&rft.externalDBID=n%2Fa&rft.externalDocID=10_3390_app13148104
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2076-3417&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2076-3417&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2076-3417&client=summon