Research on intrusion detection based on Boyer-Moore pattern matching algorithm

被引:0
作者
Li, Yulong [1 ,2 ]
Li, Chenhao [1 ]
Jiao, Yang [3 ]
Zhao, Guogang [2 ]
Liu, Yang [4 ]
Zhang, Tian [4 ]
机构
[1] Changchun Univ, Cybersecur Acad, Changchun 130022, Jilin, Peoples R China
[2] Jilin Prov Transport Sci Res Instiina, Changchun 130012, Jilin, Peoples R China
[3] Changchun Sixth Middle Sch, Changchun 130031, Jilin, Peoples R China
[4] Chongqing Publ Secur Bur, Chongqing 401336, Peoples R China
来源
PROCEEDINGS OF 2023 7TH INTERNATIONAL CONFERENCE ON ELECTRONIC INFORMATION TECHNOLOGY AND COMPUTER ENGINEERING, EITCE 2023 | 2023年
关键词
WEB log; Intrusion detection; Pattern matching; Boyer-Moore;
D O I
10.1145/3650400.3650650
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The security of WEB applications has always been an important research direction in the field of network security. Intrusion detection based on WEB logs is a common detection method. It analyzes the access logs of the WEB server to detect malicious requests and attack behaviors, thereby protecting the security of WEB applications. In this article, we will discuss an intrusion detection method based on the Boyer-Moore algorithm to prevent SQL injection and XSS attacks. This method is based on the pattern matching algorithm Boyer-Moore. It uses misuse detection technology to compare log information with known feature values to determine whether an attack has occurred, and displays the detection results to the user through a visual interface to help users Better understand the current security landscape. The experiment verified the effectiveness and feasibility of the intrusion detection system based on Boyer-Moore pattern matching algorithm, which can provide strong security guarantee for WEB applications.
引用
收藏
页码:1490 / 1494
页数:5
相关论文
共 50 条
  • [1] A fast Boyer-Moore type pattern matching algorithm for highly similar sequences
    Ben Nsira, Nadia
    Lecroq, Thierry
    Elloumi, Mourad
    INTERNATIONAL JOURNAL OF DATA MINING AND BIOINFORMATICS, 2015, 13 (03) : 266 - 288
  • [2] Correctness of sub string-preprocessing in Boyer-Moore's pattern matching algorithm
    Stomp, F
    THEORETICAL COMPUTER SCIENCE, 2003, 290 (01) : 59 - 78
  • [3] Research of pattern matching in intrusion detection
    Huang, JC
    Tian, JF
    Du, RZ
    Zhai, JQ
    2003 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-5, PROCEEDINGS, 2003, : 1877 - 1882
  • [4] An Efficient Pattern Matching Algorithm for Intrusion Detection Systems
    Anithakumari, S.
    Chithraprasad, D.
    2009 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE, VOLS 1-3, 2009, : 223 - +
  • [5] Improved Algorithm of pattern matching for Intrusion Detection
    Liu Zhen
    Xu Su
    Zhang Jue
    MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 446 - 449
  • [6] IMPROVEMENT OF ALGORITHM FOR PATTERN MATCHING IN INTRUSION DETECTION
    Zhao, Dongcan
    Zhu, Xiaomin
    Xu, Tong
    2013 5TH IEEE INTERNATIONAL CONFERENCE ON BROADBAND NETWORK & MULTIMEDIA TECHNOLOGY (IC-BNMT), 2013, : 281 - 284
  • [7] Enhanced pattern matching performance using improved boyer moore horspool Algorithm
    Hong, D. (dear_red9@163.com), 1600, Advanced Institute of Convergence Information Technology (07): : 70 - 76
  • [8] An Improved Pattern Matching Algorithm in the Intrusion Detection System
    Zhang Ping
    Liu Jianghui
    MEASURING TECHNOLOGY AND MECHATRONICS AUTOMATION, PTS 1 AND 2, 2011, 48-49 : 203 - +
  • [9] Efficient Pattern Matching Algorithm for Intrusion Detection Systems
    Yang, Wenjun
    SENSORS, MECHATRONICS AND AUTOMATION, 2014, 511-512 : 1178 - 1184
  • [10] The Research and Amelioration of Pattern-matching Algorithm in Intrusion Detection System
    Wu, Pei-fei
    Shen, Hai-juan
    2012 IEEE 14TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS & 2012 IEEE 9TH INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS (HPCC-ICESS), 2012, : 1712 - 1715