Accelerating Pattern Matching Using a Novel Multi-Pattern-Matching Algorithm on GPU
Nowadays, almost all network traffic is encrypted. Attackers hide themselves using this traffic and attack over encrypted channels. Inspections performed only on packet headers and metadata are insufficient for detecting cyberattacks over encrypted channels. Therefore, it is important to analyze pac...
Saved in:
| Published in | Applied sciences Vol. 13; no. 14; p. 8104 |
|---|---|
| Main Authors | , |
| Format | Journal Article |
| Language | English |
| Published |
Basel
MDPI AG
01.07.2023
|
| Subjects | |
| Online Access | Get full text |
| ISSN | 2076-3417 2076-3417 |
| DOI | 10.3390/app13148104 |
Cover
| Abstract | Nowadays, almost all network traffic is encrypted. Attackers hide themselves using this traffic and attack over encrypted channels. Inspections performed only on packet headers and metadata are insufficient for detecting cyberattacks over encrypted channels. Therefore, it is important to analyze packet contents in applications that require control over payloads, such as content filtering, intrusion detection systems (IDSs), data loss prevention systems (DLPs), and fraud detection. This technology, known as deep packet inspection (DPI), provides full control over the communication between two end stations by keenly analyzing the network traffic. This study proposes a multi-pattern-matching algorithm that reduces the memory space and time required in the DPI pattern matching compared to traditional automaton-based algorithms with its ability to process more than one packet payload character at once. The pattern-matching process in the DPI system created to evaluate the performance of the proposed algorithm (PA) is conducted on the graphics processing unit (GPU), which accelerates the processing of network packets with its parallel computing capability. This study compares the PA with the Aho-Corasick (AC) and Wu–Manber (WM) algorithms, which are widely used in the pattern-matching process, considering the memory space required and throughput obtained. Algorithm tables created with a dataset containing 500 patterns use 425 and 688 times less memory space than those of the AC and WM algorithms, respectively. In the pattern-matching process using these tables, the PA is 3.5 and 1.5 times more efficient than the AC and WM algorithms, respectively. |
|---|---|
| AbstractList | Nowadays, almost all network traffic is encrypted. Attackers hide themselves using this traffic and attack over encrypted channels. Inspections performed only on packet headers and metadata are insufficient for detecting cyberattacks over encrypted channels. Therefore, it is important to analyze packet contents in applications that require control over payloads, such as content filtering, intrusion detection systems (IDSs), data loss prevention systems (DLPs), and fraud detection. This technology, known as deep packet inspection (DPI), provides full control over the communication between two end stations by keenly analyzing the network traffic. This study proposes a multi-pattern-matching algorithm that reduces the memory space and time required in the DPI pattern matching compared to traditional automaton-based algorithms with its ability to process more than one packet payload character at once. The pattern-matching process in the DPI system created to evaluate the performance of the proposed algorithm (PA) is conducted on the graphics processing unit (GPU), which accelerates the processing of network packets with its parallel computing capability. This study compares the PA with the Aho-Corasick (AC) and Wu–Manber (WM) algorithms, which are widely used in the pattern-matching process, considering the memory space required and throughput obtained. Algorithm tables created with a dataset containing 500 patterns use 425 and 688 times less memory space than those of the AC and WM algorithms, respectively. In the pattern-matching process using these tables, the PA is 3.5 and 1.5 times more efficient than the AC and WM algorithms, respectively. |
| Audience | Academic |
| Author | Yavanoğlu, Uraz Çelebi, Merve |
| Author_xml | – sequence: 1 givenname: Merve surname: Çelebi fullname: Çelebi, Merve – sequence: 2 givenname: Uraz surname: Yavanoğlu fullname: Yavanoğlu, Uraz |
| BookMark | eNp9kV1rFDEUhoNUsNZe-QcGvNSp-Z7M5VK0Ftpa0L0OZ_KxzTKbjJms0n9vtlNKEWwCSTh53jcn57xFRzFFh9B7gs8Y6_FnmCbCCFcE81fomOJOtoyT7ujZ-Q06nectrqMnrILH6MfKGDe6DCXETXMLpbgcm2so5u4QWM-HFZqb9NuNzfV-LKF9hNonaDVuUg7lbtek2Fzcrt-h1x7G2Z0-7ido_fXLz_Nv7dX3i8vz1VVrOGalFZJR7pVlZuiEGDyllkuvQFAKVrLeA-XGguTEOoH9MAhDMOnkABbbesVO0OXiaxNs9ZTDDvK9ThD0QyDljYZcghmdVh1XgwSBqeLccToYYXtFQAIZOmy76vVp8drHCe7_wDg-GRKsD_XVz-pb8Q8LPuX0a-_mordpn2P9ra4v0F5SJQ7U2UJtoOYQok8lg6nTul0wtXs-1PiqE0oJ2T0IyCIwOc1zdl6bUGprUqzCMP4nlY__aF5K_C9dR6ik |
| CitedBy_id | crossref_primary_10_1049_ise2_5523834 crossref_primary_10_4018_IJDST_341269 |
| Cites_doi | 10.1109/LCOMM.2016.2601898 10.1007/s11227-018-2517-0 10.1109/NTICT.2017.7976111 10.1016/j.mejo.2015.08.002 10.1109/COMST.2016.2566669 10.1371/journal.pone.0139301 10.1007/s11042-019-07822-8 10.1109/ICC.2016.7510811 10.1109/LCOMM.2006.1603387 10.1109/TVLSI.2017.2753843 10.2139/ssrn.4072552 10.1049/iet-ifs.2017.0421 10.1109/ISPASS.2009.4919649 10.1109/SURV.2013.100613.00161 10.14257/ijfgcn.2016.9.9.15 10.1109/ISDA.2012.6416511 10.3390/app7101082 10.1109/90.851975 10.1109/ASAP.2009.16 10.17706/jcp.12.2.183-189 10.1109/INDICON49873.2020.9342041 10.1109/TNET.2020.3016785 10.1109/TC.2012.254 10.1109/PCCC.2009.5403809 10.1145/359842.359859 10.1109/ICICISYS.2010.5658784 10.1145/2674005.2674994 10.1109/BigDataService.2018.00044 10.1109/GLOCOM.2007.8 10.1002/0470099747 10.1145/2881025.2881034 10.1145/3033288.3033346 10.1007/s10922-021-09589-6 10.1007/s10009-019-00520-8 10.1109/TNET.2012.2224881 10.1016/j.jpdc.2015.11.001 10.1016/j.adhoc.2013.04.014 10.1145/1839667.1839672 10.1016/j.matpr.2021.04.028 10.1109/ICACCI.2014.6968595 10.1007/s11227-018-2685-y 10.1109/ICRAIE.2016.7939534 10.1016/j.jnca.2012.07.010 10.1145/362686.362692 10.1147/rd.312.0249 10.1145/360825.360855 10.1109/ACCESS.2021.3074801 |
| ContentType | Journal Article |
| Copyright | COPYRIGHT 2023 MDPI AG 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
| Copyright_xml | – notice: COPYRIGHT 2023 MDPI AG – notice: 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
| DBID | AAYXX CITATION ABUWG AFKRA AZQEC BENPR CCPQU DWQXO PHGZM PHGZT PIMPY PKEHL PQEST PQQKQ PQUKI PRINS ADTOC UNPAY DOA |
| DOI | 10.3390/app13148104 |
| DatabaseName | CrossRef ProQuest Central (Alumni) ProQuest Central UK/Ireland ProQuest Central Essentials ProQuest Central ProQuest One Community College ProQuest Central Korea Proquest Central Premium ProQuest One Academic Publicly Available Content Database ProQuest One Academic Middle East (New) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Academic ProQuest One Academic UKI Edition ProQuest Central China Unpaywall for CDI: Periodical Content Unpaywall DOAJ Directory of Open Access Journals |
| DatabaseTitle | CrossRef Publicly Available Content Database ProQuest One Academic Middle East (New) ProQuest Central Essentials ProQuest One Academic Eastern Edition ProQuest Central (Alumni Edition) ProQuest One Community College ProQuest Central China ProQuest Central ProQuest One Academic UKI Edition ProQuest Central Korea ProQuest Central (New) ProQuest One Academic ProQuest One Academic (New) |
| DatabaseTitleList | Publicly Available Content Database CrossRef |
| Database_xml | – sequence: 1 dbid: DOA name: DOAJ Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website – sequence: 2 dbid: UNPAY name: Unpaywall url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/ sourceTypes: Open Access Repository – sequence: 3 dbid: BENPR name: ProQuest Central url: http://www.proquest.com/pqcentral?accountid=15518 sourceTypes: Aggregation Database |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering Sciences (General) |
| EISSN | 2076-3417 |
| ExternalDocumentID | oai_doaj_org_article_8748b6a502844e42bc5d981a6a1b70d7 10.3390/app13148104 A758856754 10_3390_app13148104 |
| GeographicLocations | Germany |
| GeographicLocations_xml | – name: Germany |
| GroupedDBID | .4S 2XV 5VS 7XC 8CJ 8FE 8FG 8FH AADQD AAFWJ AAYXX ADBBV ADMLS AFKRA AFPKN AFZYC ALMA_UNASSIGNED_HOLDINGS APEBS ARCSS BCNDV BENPR CCPQU CITATION CZ9 D1I D1J D1K GROUPED_DOAJ IAO IGS ITC K6- K6V KC. KQ8 L6V LK5 LK8 M7R MODMG M~E OK1 P62 PHGZM PHGZT PIMPY PROAC TUS ABUWG AZQEC DWQXO PKEHL PQEST PQQKQ PQUKI PRINS ADTOC IPNFZ RIG UNPAY |
| ID | FETCH-LOGICAL-c403t-56324f8d3cb755bf22d46f8a522ad639fa24cda641de50fbb5c10176bad0d24c3 |
| IEDL.DBID | BENPR |
| ISSN | 2076-3417 |
| IngestDate | Fri Oct 03 12:45:26 EDT 2025 Sun Oct 26 03:28:15 EDT 2025 Mon Jun 30 05:09:24 EDT 2025 Mon Oct 20 17:19:33 EDT 2025 Thu Oct 16 04:36:19 EDT 2025 Thu Apr 24 23:04:46 EDT 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 14 |
| Language | English |
| License | cc-by |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c403t-56324f8d3cb755bf22d46f8a522ad639fa24cda641de50fbb5c10176bad0d24c3 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| OpenAccessLink | https://www.proquest.com/docview/2842962854?pq-origsite=%requestingapplication%&accountid=15518 |
| PQID | 2842962854 |
| PQPubID | 2032433 |
| ParticipantIDs | doaj_primary_oai_doaj_org_article_8748b6a502844e42bc5d981a6a1b70d7 unpaywall_primary_10_3390_app13148104 proquest_journals_2842962854 gale_infotracacademiconefile_A758856754 crossref_citationtrail_10_3390_app13148104 crossref_primary_10_3390_app13148104 |
| PublicationCentury | 2000 |
| PublicationDate | 2023-07-01 |
| PublicationDateYYYYMMDD | 2023-07-01 |
| PublicationDate_xml | – month: 07 year: 2023 text: 2023-07-01 day: 01 |
| PublicationDecade | 2020 |
| PublicationPlace | Basel |
| PublicationPlace_xml | – name: Basel |
| PublicationTitle | Applied sciences |
| PublicationYear | 2023 |
| Publisher | MDPI AG |
| Publisher_xml | – name: MDPI AG |
| References | Lee (ref_56) 2012; 21 Ahmadi (ref_27) 2016; 20 Otoum (ref_33) 2021; 29 Roesch (ref_46) 1991; 99 ref_14 ref_13 ref_10 ref_54 ref_53 ref_52 ref_51 Xu (ref_4) 2016; 18 Ho (ref_72) 2018; 12 ref_19 ref_16 ref_59 Sharma (ref_36) 2016; 9 Kim (ref_62) 2015; 46 Pao (ref_55) 2010; 7 ref_61 Aldwairi (ref_39) 2016; 11 Rahman (ref_32) 2017; 12 Yin (ref_48) 2019; 75 ref_69 ref_24 ref_68 ref_67 ref_22 ref_66 ref_21 ref_20 ref_64 ref_63 ref_28 Ahmadi (ref_23) 2017; 7 ref_26 Chen (ref_57) 2013; 10 ref_71 Kocak (ref_25) 2006; 10 (ref_60) 2021; 9 ref_35 ref_34 Antonello (ref_5) 2012; 35 ref_31 ref_30 Bloom (ref_17) 1970; 13 Nagaraju (ref_50) 2021; 47 ref_73 ref_38 ref_37 Bulut (ref_41) 2023; 38 Finsterbusch (ref_11) 2013; 16 Havlena (ref_45) 2020; 22 Aho (ref_9) 1975; 18 Sun (ref_49) 2019; 75 Shoaib (ref_15) 2017; 8 ref_47 Boyer (ref_29) 1977; 20 ref_44 Zhang (ref_40) 2020; 79 ref_43 ref_42 ref_1 Wang (ref_58) 2017; 26 ref_3 Lin (ref_70) 2012; 62 Raza (ref_2) 2013; 11 Han (ref_65) 2020; 28 Hsieh (ref_7) 2016; 88 ref_8 Fan (ref_18) 2000; 8 Karp (ref_12) 1987; 31 ref_6 |
| References_xml | – volume: 20 start-page: 2217 year: 2016 ident: ref_27 article-title: Deep packet inspection using quotient filter publication-title: IEEE Commun. Lett. doi: 10.1109/LCOMM.2016.2601898 – volume: 75 start-page: 3317 year: 2019 ident: ref_49 article-title: An improved method in deep packet inspection based on regular expression publication-title: J. Supercomput. doi: 10.1007/s11227-018-2517-0 – ident: ref_28 doi: 10.1109/NTICT.2017.7976111 – volume: 46 start-page: 950 year: 2015 ident: ref_62 article-title: A scalable architecture for reducing power consumption in pipelined deep packet inspection system publication-title: Microelectron. J. doi: 10.1016/j.mejo.2015.08.002 – volume: 18 start-page: 2991 year: 2016 ident: ref_4 article-title: A survey on regular expression matching for deep packet inspection: Applications, algorithms, and hardware platforms publication-title: IEEE Commun. Surv. Tutor. doi: 10.1109/COMST.2016.2566669 – ident: ref_6 doi: 10.1371/journal.pone.0139301 – volume: 79 start-page: 16245 year: 2020 ident: ref_40 article-title: XWM: A high-speed matching algorithm for large-scale URL rules in wireless surveillance applications publication-title: Multimed. Tools Appl. doi: 10.1007/s11042-019-07822-8 – volume: 11 start-page: 5 year: 2016 ident: ref_39 article-title: Bloom filters optimized Wu-Manber for intrusion detection publication-title: J. Digit. Forensics Secur. Law – ident: ref_68 – ident: ref_3 doi: 10.1109/ICC.2016.7510811 – volume: 10 start-page: 210 year: 2006 ident: ref_25 article-title: Low-power bloom filter architecture for deep packet inspection publication-title: IEEE Commun. Lett. doi: 10.1109/LCOMM.2006.1603387 – ident: ref_42 – volume: 26 start-page: 143 year: 2017 ident: ref_58 article-title: Memory-based architecture for multicharacter Aho–Corasick string matching publication-title: IEEE Trans. Very Large Scale İntegr. VLSI Syst. doi: 10.1109/TVLSI.2017.2753843 – ident: ref_35 – ident: ref_61 doi: 10.2139/ssrn.4072552 – volume: 12 start-page: 381 year: 2018 ident: ref_72 article-title: Parallel multiple pattern matching schemes based on cuckoo filter for deep packet inspection on graphics processing units publication-title: IET Inf. Secur. doi: 10.1049/iet-ifs.2017.0421 – ident: ref_66 doi: 10.1109/ISPASS.2009.4919649 – volume: 16 start-page: 1135 year: 2013 ident: ref_11 article-title: A survey of payload-based traffic classification approaches publication-title: IEEE Commun. Surv. Tutor. doi: 10.1109/SURV.2013.100613.00161 – volume: 9 start-page: 169 year: 2016 ident: ref_36 article-title: Single Digit Hash Boyer Moore Horspool Pattern Matching Algorithm for Intrusion Detection System publication-title: Int. J. Future Gener. Commun. Netw. doi: 10.14257/ijfgcn.2016.9.9.15 – ident: ref_30 doi: 10.1109/ISDA.2012.6416511 – ident: ref_1 doi: 10.3390/app7101082 – volume: 8 start-page: 281 year: 2000 ident: ref_18 article-title: Summary cache: A scalable wide-area web cache sharing protocol publication-title: IEEE/ACM Trans. Netw. doi: 10.1109/90.851975 – ident: ref_8 doi: 10.1109/ASAP.2009.16 – ident: ref_52 – volume: 12 start-page: 183 year: 2017 ident: ref_32 article-title: SQL Injection Attack Scanner Using Boyer-Moore String Matching Algorithm publication-title: J. Comput. doi: 10.17706/jcp.12.2.183-189 – ident: ref_59 doi: 10.1109/INDICON49873.2020.9342041 – ident: ref_69 – ident: ref_10 – volume: 28 start-page: 2727 year: 2020 ident: ref_65 article-title: A secure middlebox framework for enabling visibility over multiple encryption protocols publication-title: IEEE/ACM Trans. Netw. doi: 10.1109/TNET.2020.3016785 – volume: 62 start-page: 1906 year: 2012 ident: ref_70 article-title: Accelerating pattern matching using a novel parallel algorithm on GPUs publication-title: IEEE Trans. Comput. doi: 10.1109/TC.2012.254 – volume: 38 start-page: 875 year: 2023 ident: ref_41 article-title: Q-gram hash comparison based multiple exact string matching algorithm for DNA sequences publication-title: J. Fac. Eng. Archit. Gazi Univ. – ident: ref_13 – ident: ref_38 – ident: ref_67 doi: 10.1109/PCCC.2009.5403809 – volume: 8 start-page: 081128 year: 2017 ident: ref_15 article-title: GDPI: Signature based deep packet inspection using GPUs publication-title: Int. J. Adv. Comput. Sci. Appl. – volume: 20 start-page: 762 year: 1977 ident: ref_29 article-title: A fast string searching algorithm publication-title: Commun. ACM doi: 10.1145/359842.359859 – ident: ref_20 – ident: ref_37 doi: 10.1109/ICICISYS.2010.5658784 – volume: 7 start-page: 346 year: 2017 ident: ref_23 article-title: Qcf for deep packet inspection publication-title: IET Netw. – ident: ref_53 – ident: ref_22 doi: 10.1145/2674005.2674994 – ident: ref_24 – ident: ref_34 – ident: ref_16 doi: 10.1109/BigDataService.2018.00044 – ident: ref_26 doi: 10.1109/GLOCOM.2007.8 – ident: ref_73 doi: 10.1002/0470099747 – ident: ref_47 – ident: ref_51 doi: 10.1145/2881025.2881034 – volume: 10 start-page: 1 year: 2013 ident: ref_57 article-title: An efficient multicharacter transition string-matching engine based on the aho-corasick algorithm publication-title: ACM Trans. Archit. Code Optim. – ident: ref_71 doi: 10.1145/3033288.3033346 – volume: 29 start-page: 23 year: 2021 ident: ref_33 article-title: As-ids: Anomaly and signature based ids for the internet of things publication-title: J. Netw. Syst. Manag. doi: 10.1007/s10922-021-09589-6 – volume: 22 start-page: 523 year: 2020 ident: ref_45 article-title: Approximate reduction of finite automata for high-speed network intrusion detection publication-title: Int. J. Softw. Tools Technol. Transf. doi: 10.1007/s10009-019-00520-8 – volume: 21 start-page: 1104 year: 2012 ident: ref_56 article-title: A pattern-matching scheme with high throughput performance and low memory requirement publication-title: IEEE/ACM Trans. Netw. doi: 10.1109/TNET.2012.2224881 – volume: 88 start-page: 46 year: 2016 ident: ref_7 article-title: A high-throughput DPI engine on GPU via algorithm/implementation co-optimization publication-title: J. Parallel Distrib. Comput. doi: 10.1016/j.jpdc.2015.11.001 – volume: 11 start-page: 2661 year: 2013 ident: ref_2 article-title: SVELTE: Real-time intrusion detection in the Internet of Things publication-title: Ad Hoc Netw. doi: 10.1016/j.adhoc.2013.04.014 – ident: ref_63 – ident: ref_44 – ident: ref_21 – volume: 7 start-page: 1 year: 2010 ident: ref_55 article-title: A memory-efficient pipelined implementation of the aho-corasick string-matching algorithm publication-title: ACM Trans. Archit. Code Optim. doi: 10.1145/1839667.1839672 – volume: 47 start-page: 139 year: 2021 ident: ref_50 article-title: High throughput token driven FSM based regex pattern matching for network intrusion detection system publication-title: Mater. Today Proc. doi: 10.1016/j.matpr.2021.04.028 – ident: ref_14 doi: 10.1109/ICACCI.2014.6968595 – ident: ref_54 – volume: 75 start-page: 4295 year: 2019 ident: ref_48 article-title: Improved deep packet inspection in data stream detection publication-title: J. Supercomput. doi: 10.1007/s11227-018-2685-y – volume: 99 start-page: 229 year: 1991 ident: ref_46 article-title: Snort: Lightweight intrusion detection for networks publication-title: Lisa – ident: ref_31 doi: 10.1109/ICRAIE.2016.7939534 – volume: 35 start-page: 1863 year: 2012 ident: ref_5 article-title: Deep packet inspection tools and techniques in commodity platforms: Challenges and trends publication-title: J. Netw. Comput. Appl. doi: 10.1016/j.jnca.2012.07.010 – ident: ref_64 – volume: 13 start-page: 422 year: 1970 ident: ref_17 article-title: Space/time trade-offs in hash coding with allowable errors publication-title: Commun. ACM doi: 10.1145/362686.362692 – volume: 31 start-page: 249 year: 1987 ident: ref_12 article-title: Efficient randomized pattern-matching algorithms publication-title: IBM J. Res. Dev. doi: 10.1147/rd.312.0249 – volume: 18 start-page: 333 year: 1975 ident: ref_9 article-title: Efficient string matching: An aid to bibliographic search publication-title: Commun. ACM doi: 10.1145/360825.360855 – ident: ref_19 – ident: ref_43 – volume: 9 start-page: 62857 year: 2021 ident: ref_60 article-title: Pattern Matching in YARA: Improved Aho-Corasick Algorithm publication-title: IEEE Access doi: 10.1109/ACCESS.2021.3074801 |
| SSID | ssj0000913810 |
| Score | 2.282843 |
| Snippet | Nowadays, almost all network traffic is encrypted. Attackers hide themselves using this traffic and attack over encrypted channels. Inspections performed only... |
| SourceID | doaj unpaywall proquest gale crossref |
| SourceType | Open Website Open Access Repository Aggregation Database Enrichment Source Index Database |
| StartPage | 8104 |
| SubjectTerms | Algorithms Analysis Cost control Cyberterrorism deep packet inspection Field programmable gate arrays Fraud Malware network security Optimization techniques pattern matching Performance evaluation Security software Subtitles & subtitling Technology application |
| SummonAdditionalLinks | – databaseName: DOAJ Directory of Open Access Journals dbid: DOA link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV3da9RAEB-kL9oHsVXxtMo-VPyAxWSzu7d5PMVahJaCHvRt2a9UIeZKe1X8753Z7B0BRV98TYZkMh87M9md3wAcNiKp2onIjU6KSyc096qNvGpFSnVKWjvqHT451cdL-fFcnU9GfdGZsBEeeBTcGzOXxmunMA5KmaTwQcXW1E672s-rmPvIK9NOiqm8Brc1QVeNDXkN1vW0H1w3mPvXZSTbJgRlpP7f1-NduH0zXLqfP1zfTwLO0T24WzJFthg53INbadiH3Ql-4D7sFc-8Zi8LfPSr-_BpEQLGEtLscMHOMn7mwE5wyaWfTSyfEWCOna6-p57l_lteiPiWaNFfrK6-rr98Y6uBfThbPoDl0fvP7455GZ3Ag6yaNVeEwt6Z2AQ_V8p3QkSpO-Mw23IRk5LOCRmi07KOSVWd9yqQb2rvYhXxVvMQdobVkB4BwxQsdCpFQZmAoG3VVkSFF9RcOiO6GbzeSNOGgitO4y16i_UFid5ORD-Dwy3x5Qin8Weyt6SWLQlhYOcLaBm2WIb9l2XM4AUp1ZKnIkPBlYYD_CzCvLILLJWMwoIJX3ew0bstLnxt8amizQ2mM3i-tYW_cf34f3D9BO7QRPvxRPAB7KyvbtJTzHvW_lk28V9ySPzB priority: 102 providerName: Directory of Open Access Journals – databaseName: Unpaywall dbid: UNPAY link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV3db9MwELege4A9ABsgOgbywxAfUtbYsR3nCQXEmJBWVYJK4ynyV8pEllRdOgR_PefEqSpACIlX55LYuvP5d_bdzwgdJdRxoqiNpHA8YoqKSPPMRnFGnSPOCaF87fDZVJzO2Ydzfr5Vxe_TKiEUv-icNIUgOwI3m05IMiFsIiF2mCxt-fo67CURITNPCM_5TbQjOKDxEdqZT2f5Z3-n3PB2X5aXQHTvT4VJAhEACRezDQtRx9f_u1feRbfW9VJ9_6aqamvZObmL1NDhPtvk6_G61cfmxy9cjv8zonvoTsCkOO-NaA_dcPU-2t1iKtxHe8EHXOEXgaj65X30MTcGVi1vQ_UCzzqmzhqfgXP321q4y0bACk-ba1fhrtI3CkLRRiivFs3qov1yiZsav5_NH6D5ybtPb0-jcElDZFictBH3fO-ltInRKee6pNQyUUoFuE5ZgD-losxYJRixjsel1tx4LyC0srGFR8lDNKqb2j1CGMCeKbmz1GMO6g9wM2o5NPCUKUnLMXo1aKwwgcHcX6RRFRDJePUWW-odo6ON8LIn7viz2Buv-o2IZ9vuGprVogiTt5Apk1ooDliMMceoNtxmkiihiE5jm47Rc284hfcJ0CGjQmkDDMuzaxU5BGWSQ2gGvzscbKsIzuKqgK_SrCtlHaNnG3v7W68P_lHuMbpNAZT16cWHaNSu1u4JgKhWPw3z5CcBFBNg priority: 102 providerName: Unpaywall |
| Title | Accelerating Pattern Matching Using a Novel Multi-Pattern-Matching Algorithm on GPU |
| URI | https://www.proquest.com/docview/2842962854 https://www.mdpi.com/2076-3417/13/14/8104/pdf?version=1689084855 https://doaj.org/article/8748b6a502844e42bc5d981a6a1b70d7 |
| UnpaywallVersion | publishedVersion |
| Volume | 13 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAFT databaseName: Open Access Digital Library customDbUrl: eissn: 2076-3417 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0000913810 issn: 2076-3417 databaseCode: KQ8 dateStart: 20110101 isFulltext: true titleUrlDefault: http://grweb.coalliance.org/oadl/oadl.html providerName: Colorado Alliance of Research Libraries – providerCode: PRVAON databaseName: DOAJ Directory of Open Access Journals customDbUrl: eissn: 2076-3417 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0000913810 issn: 2076-3417 databaseCode: DOA dateStart: 20110101 isFulltext: true titleUrlDefault: https://www.doaj.org/ providerName: Directory of Open Access Journals – providerCode: PRVEBS databaseName: Inspec with Full Text customDbUrl: eissn: 2076-3417 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0000913810 issn: 2076-3417 databaseCode: ADMLS dateStart: 20120901 isFulltext: true titleUrlDefault: https://www.ebsco.com/products/research-databases/inspec-full-text providerName: EBSCOhost – providerCode: PRVHPJ databaseName: ROAD: Directory of Open Access Scholarly Resources customDbUrl: eissn: 2076-3417 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0000913810 issn: 2076-3417 databaseCode: M~E dateStart: 20110101 isFulltext: true titleUrlDefault: https://road.issn.org providerName: ISSN International Centre – providerCode: PRVPQU databaseName: ProQuest Central customDbUrl: http://www.proquest.com/pqcentral?accountid=15518 eissn: 2076-3417 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0000913810 issn: 2076-3417 databaseCode: BENPR dateStart: 20110101 isFulltext: true titleUrlDefault: https://www.proquest.com/central providerName: ProQuest – providerCode: PRVPQU databaseName: ProQuest Technology Collection customDbUrl: eissn: 2076-3417 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0000913810 issn: 2076-3417 databaseCode: 8FG dateStart: 20110101 isFulltext: true titleUrlDefault: https://search.proquest.com/technologycollection1 providerName: ProQuest |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV3db9MwED9t3QPsAbEBWmFUfhjiQ7JIHNtxHhDK0LoJaVUFVBpPkWM75SEkZetA_Pf4UidUAu0xzikfd77z3dn3O4CThDkRa2apkk5QrpmkpcgsjTLmXOyclBprhy9n8mLBP16Jqx2Y9bUweKyyt4mdobatwRz5W29GWdbV-71f_aDYNQp3V_sWGjq0VrDvOoixXdhjiIw1gr3Ts9n805B1QRRMFUebQr3Ex_u4TxwnPiaIQ6u2fmnqEPz_tdP7cO-2Wenfv3Rdby1E04fwIHiQJN-I_AB2XHMI-1u4godwEDT2hrwKsNKvH8Hn3Bi_xqDEmyWZd7iaDbn0phiTUKQ7O0A0mbU_XU26ulwaiOhAlNdLz5P1t--kbcj5fPEYFtOzLx8uaGipQA2PkjUViM5eKZuYMhWirBizXFZKey9MW--sVJpxY7XksXUiqspSGNRZWWobWX8reQKjpm3cERDvmplKOMvQQ2C43ZoxK_yASLlWrBrDm56bhQl449j2oi583IGsL7ZYP4aTgXi1gdn4P9kpimUgQWzsbqC9XhZB1QqVclVKLbznxLnjrDTCZirWUsdlGtl0DC9RqAVqsP8go0Mhgv8txMIqch9CKeEDKf-6417uRVDtm-LvRBzDi2Eu3PXVT-9-zDO4jz3sN2eAj2G0vr51z72nsy4nsKum55MwiSddvsBfLWbz_OsfW3X_Aw |
| linkProvider | ProQuest |
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lb9QwEB6V9lB6QLSAWFrAh1Y8JKuJY2eTQ4W20LKl3dUKulJvwa8shzRZuluq_jl-G-OsE1YC9dZrMnKcmfE8bM83ALsRsyKUzNAktoJyyWKqRGpokDJrQ2vjWLra4cEw7o_5lwtxsQK_m1oYd62ysYm1oTaVdnvk-2hGWVrX-32Y_qSua5Q7XW1aaEjfWsEc1BBjvrDj1N7eYAo3Ozj5hPLeY-z46Pxjn_ouA1TzIJpT4QDL88REWnWFUDljhsd5IjEwkQb9dy4Z10bGPDRWBLlSQjs1jpU0gcFXEY77ANZ4xFNM_tYOj4ajr-0uj0PdTMJgURgYRWngzqXDCHOQ0LeGa1xh3THgX7-wAevX5VTe3siiWHJ8x4_hkY9YSW-hYpuwYsst2FjCMdyCTW8hZuSth7F-9wS-9bRGn-Y0rJyQUY3jWZIBmn636UXquwpEkmH1yxakrgOmnoi2RL1igjKY_7gkVUk-j8ZPYXwvzH0Gq2VV2udAMBTUubCGuYiEuePdlBmBD0SXy4TlHXjfcDPTHt_ctdkoMsxzHOuzJdZ3YLclni5gPf5PdujE0pI4LO76QXU1yfzSzpIuT1QsBUZqnFvOlBYmTUIZy1B1A9PtwBsn1MxZDJyQlr7wAX_LYW9lPUzZEoGJG35up5F75k3JLPur-B3Ya3Xhrlm_uHuY17DePx-cZWcnw9NteMgwalvcP96B1fnVtX2JUdZcvfKqTOD7fa-eP2x5OSc |
| linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lb9QwEB6VIgE9IFpALBTwoRUPKWri2HkcEFoo25bS1UqwUm-pYzvLISRLd0vVv8avYyZxwkqg3npNRo4zHs_DnvkGYCfkVgaKGy-JrPSE4pGXy9R4fsqtDayNIkW1wyfj6HAqPp_K0zX43dXCUFplpxMbRW1qTWfke6hGedrU--0VLi1isj96P__pUQcpumnt2mm0InJsry4xfFu8O9rHtd7lfPTp28dDz3UY8LTww6UnCay8SEyo81jKvODciKhIFDolyqDtLhQX2qhIBMZKv8hzqUmEo1wZ3-CrEMe9BbdjQnGnKvXRQX--Q3ibSeC3JYFhmPp0Ix2EGH0ErilcZwSbXgH_WoQNuHtRzdXVpSrLFZM3egD3na_Khq1wbcKarbZgYwXBcAs2nW5YsNcOwPrNQ_g61BqtGclWNWOTBsGzYieo9Om4izVZCkyxcf3LlqypAPYckdcTDcsZcnz5_QerK3YwmT6C6Y2w9jGsV3VlnwBDJ1AX0hpOvgini92UG4kPZCxUwosBvO24mWmHbE4NNsoMIxxifbbC-gHs9MTzFtDj_2QfaFl6EkLhbh7U57PMbeosiUWSR0qijyaEFTzX0qRJoCIV5LFv4gG8okXNSFfghLRyJQ_4W4S6lQ0xWEskhmz4ue1u3TOnRBbZX5EfwG4vC9fN-un1w7yEO7hnsi9H4-NncI-ju9YmHm_D-vL8wj5H92qZv2jkmMHZTW-cP9hlNsE |
| linkToUnpaywall | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV3db9MwELege4A9ABsgOgbywxAfUtbYsR3nCQXEmJBWVYJK4ynyV8pEllRdOgR_PefEqSpACIlX55LYuvP5d_bdzwgdJdRxoqiNpHA8YoqKSPPMRnFGnSPOCaF87fDZVJzO2Ydzfr5Vxe_TKiEUv-icNIUgOwI3m05IMiFsIiF2mCxt-fo67CURITNPCM_5TbQjOKDxEdqZT2f5Z3-n3PB2X5aXQHTvT4VJAhEACRezDQtRx9f_u1feRbfW9VJ9_6aqamvZObmL1NDhPtvk6_G61cfmxy9cjv8zonvoTsCkOO-NaA_dcPU-2t1iKtxHe8EHXOEXgaj65X30MTcGVi1vQ_UCzzqmzhqfgXP321q4y0bACk-ba1fhrtI3CkLRRiivFs3qov1yiZsav5_NH6D5ybtPb0-jcElDZFictBH3fO-ltInRKee6pNQyUUoFuE5ZgD-losxYJRixjsel1tx4LyC0srGFR8lDNKqb2j1CGMCeKbmz1GMO6g9wM2o5NPCUKUnLMXo1aKwwgcHcX6RRFRDJePUWW-odo6ON8LIn7viz2Buv-o2IZ9vuGprVogiTt5Apk1ooDliMMceoNtxmkiihiE5jm47Rc284hfcJ0CGjQmkDDMuzaxU5BGWSQ2gGvzscbKsIzuKqgK_SrCtlHaNnG3v7W68P_lHuMbpNAZT16cWHaNSu1u4JgKhWPw3z5CcBFBNg |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Accelerating+Pattern+Matching+Using+a+Novel+Multi-Pattern-Matching+Algorithm+on+GPU&rft.jtitle=Applied+sciences&rft.au=%C3%87elebi%2C+Merve&rft.au=Yavano%C4%9Flu%2C+Uraz&rft.date=2023-07-01&rft.issn=2076-3417&rft.eissn=2076-3417&rft.volume=13&rft.issue=14&rft.spage=8104&rft_id=info:doi/10.3390%2Fapp13148104&rft.externalDBID=n%2Fa&rft.externalDocID=10_3390_app13148104 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2076-3417&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2076-3417&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2076-3417&client=summon |