Research on intrusion detection based on Boyer-Moore pattern matching algorithm

被引:0
|
作者
Li, Yulong [1 ,2 ]
Li, Chenhao [1 ]
Jiao, Yang [3 ]
Zhao, Guogang [2 ]
Liu, Yang [4 ]
Zhang, Tian [4 ]
机构
[1] Changchun Univ, Cybersecur Acad, Changchun 130022, Jilin, Peoples R China
[2] Jilin Prov Transport Sci Res Instiina, Changchun 130012, Jilin, Peoples R China
[3] Changchun Sixth Middle Sch, Changchun 130031, Jilin, Peoples R China
[4] Chongqing Publ Secur Bur, Chongqing 401336, Peoples R China
关键词
WEB log; Intrusion detection; Pattern matching; Boyer-Moore;
D O I
10.1145/3650400.3650650
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The security of WEB applications has always been an important research direction in the field of network security. Intrusion detection based on WEB logs is a common detection method. It analyzes the access logs of the WEB server to detect malicious requests and attack behaviors, thereby protecting the security of WEB applications. In this article, we will discuss an intrusion detection method based on the Boyer-Moore algorithm to prevent SQL injection and XSS attacks. This method is based on the pattern matching algorithm Boyer-Moore. It uses misuse detection technology to compare log information with known feature values to determine whether an attack has occurred, and displays the detection results to the user through a visual interface to help users Better understand the current security landscape. The experiment verified the effectiveness and feasibility of the intrusion detection system based on Boyer-Moore pattern matching algorithm, which can provide strong security guarantee for WEB applications.
引用
收藏
页码:1490 / 1494
页数:5
相关论文
共 50 条
  • [31] FASTER STRING SEARCHES - BOYER-MOORE MAY BE THE ALGORITHM YOU NEED
    MENICO, C
    DR DOBBS JOURNAL, 1989, 14 (07): : 74 - 75
  • [32] Searching BWT compressed text with the Boyer-Moore algorithm and binary search
    Bell, T
    Powell, M
    Mukherjee, A
    Adjeroh, D
    DCC 2002: DATA COMPRESSION CONFERENCE, PROCEEDINGS, 2002, : 112 - 121
  • [33] Enhanced pattern matching performance using improved boyer moore horspool Algorithm
    Hong, D. (dear_red9@163.com), 1600, Advanced Institute of Convergence Information Technology (07):
  • [34] High performance parallelization of Boyer-Moore algorithm on many-core accelerators
    Jeong, Yosang
    Lee, Myungho
    Nam, Dukyun
    Kim, Jik-Soo
    Hwang, Soonwook
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2015, 18 (03): : 1087 - 1098
  • [35] Research of pattern matching in intrusion detection
    Huang, JC
    Tian, JF
    Du, RZ
    Zhai, JQ
    2003 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-5, PROCEEDINGS, 2003, : 1877 - 1882
  • [36] The Research and Amelioration of Pattern-matching Algorithm in Intrusion Detection System
    Wu, Pei-fei
    Shen, Hai-juan
    2012 IEEE 14TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS & 2012 IEEE 9TH INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS (HPCC-ICESS), 2012, : 1712 - 1715
  • [37] High Performance Parallelization of Boyer-Moore Algorithm on Many-Core Accelerators
    Jeong, Yosang
    Lee, Myungho
    Nam, Dukyun
    Kim, Jik-Soo
    Hwang, Soonwook
    2014 INTERNATIONAL CONFERENCE ON CLOUD AND AUTONOMIC COMPUTING (ICCAC 2014), 2014, : 265 - 272
  • [38] LZgrep: a Boyer-Moore string matching tool for Ziv-Lempel compressed text
    Navarro, G
    Tarhio, J
    SOFTWARE-PRACTICE & EXPERIENCE, 2005, 35 (12): : 1107 - 1130
  • [39] Efficient Extraction Method for Biological Data Using Boyer-Moore Search Algorithm
    Jaber, Khalid Mohammad
    Al-Khatib, Ra'ed M.
    Taghizadeh, Alireza
    Al-Khateeb, Asef
    CREATING GLOBAL COMPETITIVE ECONOMIES: 2020 VISION PLANNING & IMPLEMENTATION, VOLS 1-3, 2013, : 1274 - +
  • [40] A Mechanically Checked Proof of the Correctness of the Boyer-Moore Fast String Searching Algorithm
    Moore, J. Strother
    Martinez, Matt
    ENGINEERING METHODS AND TOOLS FOR SOFTWARE SAFETY AND SECURITY, 2009, 22 : 267 - 284