J
John W. Lockwood
Researcher at Washington University in St. Louis
Publications - 135
Citations - 7013
John W. Lockwood is an academic researcher from Washington University in St. Louis. The author has contributed to research in topics: Network packet & Field-programmable gate array. The author has an hindex of 47, co-authored 135 publications receiving 6930 citations. Previous affiliations of John W. Lockwood include University of Washington.
Papers
More filters
Journal ArticleDOI
Deep packet inspection using parallel bloom filters
TL;DR: This work describes a hardware-based technique using Bloom filters, which can detect strings in streaming data without degrading network throughput and queries a database of strings to check for the membership of a particular string.
Proceedings ArticleDOI
Fast hash table lookup using extended bloom filter: an aid to network processing
TL;DR: This work presents a novel hash table data structure and lookup algorithm which improves the performance over a naive hash table by reducing the number of memory accesses needed for the most time-consuming lookups, which allows designers to achieve higher lookup performance for a given memory bandwidth.
Proceedings ArticleDOI
Implementation of a content-scanning module for an Internet firewall
TL;DR: A module has been implemented in Field Programmable Gate Array (FPGA) hardware that scans the content of Internet packets at Gigabits/second rates and automatically generates the Finite State Machines (FSMs) to search for regular expressions.
Proceedings ArticleDOI
Deep packet inspection using parallel Bloom filters
TL;DR: This work describes a technique based on Bloom filters for detecting predefined signatures (a string of bytes) in the packet payload and uses hardware Bloom filters to isolate all packets that potentially containpredefined signatures.
Proceedings ArticleDOI
Efficient packet classification for network intrusion detection using FPGA
Haoyu Song,John W. Lockwood +1 more
TL;DR: A novel packet classification architecture called BV-TCAM is presented, which is implemented for an FPGA-based Network Intrusion Detection System (NIDS), which can report multiple matches at gigabit per second network link rates.