Research on intrusion detection based on Boyer-Moore pattern matching algorithm

被引:0
|
作者
Li, Yulong [1 ,2 ]
Li, Chenhao [1 ]
Jiao, Yang [3 ]
Zhao, Guogang [2 ]
Liu, Yang [4 ]
Zhang, Tian [4 ]
机构
[1] Changchun Univ, Cybersecur Acad, Changchun 130022, Jilin, Peoples R China
[2] Jilin Prov Transport Sci Res Instiina, Changchun 130012, Jilin, Peoples R China
[3] Changchun Sixth Middle Sch, Changchun 130031, Jilin, Peoples R China
[4] Chongqing Publ Secur Bur, Chongqing 401336, Peoples R China
关键词
WEB log; Intrusion detection; Pattern matching; Boyer-Moore;
D O I
10.1145/3650400.3650650
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The security of WEB applications has always been an important research direction in the field of network security. Intrusion detection based on WEB logs is a common detection method. It analyzes the access logs of the WEB server to detect malicious requests and attack behaviors, thereby protecting the security of WEB applications. In this article, we will discuss an intrusion detection method based on the Boyer-Moore algorithm to prevent SQL injection and XSS attacks. This method is based on the pattern matching algorithm Boyer-Moore. It uses misuse detection technology to compare log information with known feature values to determine whether an attack has occurred, and displays the detection results to the user through a visual interface to help users Better understand the current security landscape. The experiment verified the effectiveness and feasibility of the intrusion detection system based on Boyer-Moore pattern matching algorithm, which can provide strong security guarantee for WEB applications.
引用
收藏
页码:1490 / 1494
页数:5
相关论文
共 50 条
  • [1] A Boyer-Moore type algorithm for compressed pattern matching
    Shibata, Y
    Matsumoto, T
    Takeda, M
    Shinohara, A
    Arikawa, S
    COMBINATORIAL PATTERN MATCHING, 2000, 1848 : 181 - 194
  • [2] A Boyer-Moore Type Algorithm for Timed Pattern Matching
    Waga, Masaki
    Akazaki, Takumi
    Hasuo, Ichiro
    FORMAL MODELING AND ANALYSIS OF TIMED SYSTEMS, FORMATS 2016, 2016, 9884 : 121 - 139
  • [3] Composite string matching algorithm based on boyer-moore method
    Huang, Wenqi
    Xiong, Zhengda
    Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2009, 37 (12): : 48 - 51
  • [4] A fast Boyer-Moore type pattern matching algorithm for highly similar sequences
    Ben Nsira, Nadia
    Lecroq, Thierry
    Elloumi, Mourad
    INTERNATIONAL JOURNAL OF DATA MINING AND BIOINFORMATICS, 2015, 13 (03) : 266 - 288
  • [5] Correctness of sub string-preprocessing in Boyer-Moore's pattern matching algorithm
    Stomp, F
    THEORETICAL COMPUTER SCIENCE, 2003, 290 (01) : 59 - 78
  • [6] Mechanization of a proof of string-preprocessing in Boyer-Moore's pattern matching algorithm
    Besta, M
    Stomp, F
    EIGHTH IEEE INTERNATIONAL CONFERENCE ON ENGINEERING OF COMPLEX COMPUTER SYSTEMS, PROCEEDINGS, 2002, : 68 - 77
  • [7] A VARIATION ON THE BOYER-MOORE ALGORITHM
    LECROQ, T
    THEORETICAL COMPUTER SCIENCE, 1992, 92 (01) : 119 - 144
  • [8] APPROXIMATE BOYER-MOORE STRING MATCHING
    TARHIO, J
    UKKONEN, E
    SIAM JOURNAL ON COMPUTING, 1993, 22 (02) : 243 - 260
  • [9] Single Digit Hash Boyer Moore Horspool Pattern Matching Algorithm for Intrusion Detection System
    Sharma, Sakshi
    Dixit, Manish
    INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2016, 9 (09): : 169 - 180
  • [10] A Method for Web Application Vulnerabilities Detection by Using Boyer-Moore String Matching Algorithm
    Saleh, Ain Zubaidah Mohd
    Rozali, Nur Amizah
    Buja, Alya Geogiana
    Jalil, Kamarularifin Abd.
    Ali, Fakariah Hani Mohd
    Rahman, Teh Faradilla Abdul
    THIRD INFORMATION SYSTEMS INTERNATIONAL CONFERENCE 2015, 2015, 72 : 112 - 121