{"id":3342,"date":"2011-03-25T21:13:12","date_gmt":"2011-03-25T21:13:12","guid":{"rendered":"http:\/\/hgpu.org\/?p=3342"},"modified":"2011-03-25T21:13:12","modified_gmt":"2011-03-25T21:13:12","slug":"fast-virus-signature-matching-based-on-the-high-performance-computing-of-gpu","status":"publish","type":"post","link":"https:\/\/hgpu.org\/?p=3342","title":{"rendered":"Fast Virus Signature Matching Based on the High Performance Computing of GPU"},"content":{"rendered":"<p>For the virus signature matching time of traditional the eigenvalue is too long, which can&#8217;t meet the need of the information security, a method of fast virus signature matching on the GPU is compelled. The system uses the GPU as a fast filter to quickly identify possible virus signatures for thousands of data objects in parallel. The performance of their library suggests that the GPU is now a viable platform for cost-effective, high-performance network security processing. And it shows that the computing speed of the eigenvalue based on GPU is obviously higher than the eigenvalue based on CPU by the experiment.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>For the virus signature matching time of traditional the eigenvalue is too long, which can&#8217;t meet the need of the information security, a method of fast virus signature matching on the GPU is compelled. The system uses the GPU as a fast filter to quickly identify possible virus signatures for thousands of data objects in [&hellip;]<\/p>\n","protected":false},"author":351,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[36,11,3,287],"tags":[1787,1782,1800],"class_list":["post-3342","post","type-post","status-publish","format-standard","hentry","category-algorithms","category-computer-science","category-paper","category-security","tag-algorithms","tag-computer-science","tag-security"],"views":1858,"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/hgpu.org\/index.php?rest_route=\/wp\/v2\/posts\/3342","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hgpu.org\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hgpu.org\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hgpu.org\/index.php?rest_route=\/wp\/v2\/users\/351"}],"replies":[{"embeddable":true,"href":"https:\/\/hgpu.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=3342"}],"version-history":[{"count":0,"href":"https:\/\/hgpu.org\/index.php?rest_route=\/wp\/v2\/posts\/3342\/revisions"}],"wp:attachment":[{"href":"https:\/\/hgpu.org\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=3342"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hgpu.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=3342"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hgpu.org\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=3342"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}