Research on intrusion detection based on Boyer-Moore pattern matching algorithm

被引:0
|
作者
Li, Yulong [1 ,2 ]
Li, Chenhao [1 ]
Jiao, Yang [3 ]
Zhao, Guogang [2 ]
Liu, Yang [4 ]
Zhang, Tian [4 ]
机构
[1] Changchun Univ, Cybersecur Acad, Changchun 130022, Jilin, Peoples R China
[2] Jilin Prov Transport Sci Res Instiina, Changchun 130012, Jilin, Peoples R China
[3] Changchun Sixth Middle Sch, Changchun 130031, Jilin, Peoples R China
[4] Chongqing Publ Secur Bur, Chongqing 401336, Peoples R China
关键词
WEB log; Intrusion detection; Pattern matching; Boyer-Moore;
D O I
10.1145/3650400.3650650
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The security of WEB applications has always been an important research direction in the field of network security. Intrusion detection based on WEB logs is a common detection method. It analyzes the access logs of the WEB server to detect malicious requests and attack behaviors, thereby protecting the security of WEB applications. In this article, we will discuss an intrusion detection method based on the Boyer-Moore algorithm to prevent SQL injection and XSS attacks. This method is based on the pattern matching algorithm Boyer-Moore. It uses misuse detection technology to compare log information with known feature values to determine whether an attack has occurred, and displays the detection results to the user through a visual interface to help users Better understand the current security landscape. The experiment verified the effectiveness and feasibility of the intrusion detection system based on Boyer-Moore pattern matching algorithm, which can provide strong security guarantee for WEB applications.
引用
收藏
页码:1490 / 1494
页数:5
相关论文
共 50 条
  • [41] Boyer-Moore Algorithm in retrieving deleted Short Message Service in Android Platform
    Rahmat, R. F.
    Prayoga, D. F.
    Gunawan, D.
    Sitompul, O. S.
    10TH INTERNATIONAL CONFERENCE NUMERICAL ANALYSIS IN ENGINEERING, 2018, 308
  • [42] IMPROVEMENT OF ALGORITHM FOR PATTERN MATCHING IN INTRUSION DETECTION
    Zhao, Dongcan
    Zhu, Xiaomin
    Xu, Tong
    2013 5TH IEEE INTERNATIONAL CONFERENCE ON BROADBAND NETWORK & MULTIMEDIA TECHNOLOGY (IC-BNMT), 2013, : 281 - 284
  • [43] An Effective Pattern Matching Algorithm for Intrusion Detection
    Zhang, Qing-Qing
    Zhang, Qian
    Feng, Yue-jiang
    MECHATRONICS ENGINEERING, COMPUTING AND INFORMATION TECHNOLOGY, 2014, 556-562 : 3010 - +
  • [44] Improved Algorithm of pattern matching for Intrusion Detection
    Liu Zhen
    Xu Su
    Zhang Jue
    MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 446 - 449
  • [45] The improving pattern matching algorithm of intrusion detection
    Qu, Zhaoyang
    Huang, Xiaobo
    CEIS 2011, 2011, 15
  • [46] Design of Intrusion Detection System Based on a New Pattern Matching Algorithm
    Zhang Hu
    2009 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND TECHNOLOGY, VOL I, PROCEEDINGS, 2009, : 545 - 548
  • [47] Boyer-Moore Horspool Algorithm Used in Content Management System of Data Fast Searching
    Hoong, Chan Chung
    Ameedeen, Mohamed Ariff
    ADVANCED SCIENCE LETTERS, 2017, 23 (11) : 11387 - 11390
  • [48] Programmable SoC platform for Deep Packet Inspection using enhanced Boyer-Moore algorithm
    Dominguez, Adrian
    Carballo, Pedro P.
    Nunez, Antonio
    2017 12TH INTERNATIONAL SYMPOSIUM ON RECONFIGURABLE COMMUNICATION-CENTRIC SYSTEMS-ON-CHIP (RECOSOC), 2017,
  • [49] On modification of Boyer-Moore-horspool's algorithm for tree pattern matching in linearised trees
    Travnicek, Jan
    Janousek, Jan
    Melichar, Borivoj
    Cleophas, Loek
    THEORETICAL COMPUTER SCIENCE, 2020, 830 : 60 - 90
  • [50] A Survey of Pattern Matching Algorithm in Intrusion Detection System
    Gharaee, Hossein
    Seifi, Shokoufeh
    Monsefan, Nima
    2014 7th International Symposium on Telecommunications (IST), 2014, : 946 - 953