Counting Bloom Filters for Pattern Matching and Anti-Evasion at the Wire Speed

被引:13
作者
Antichi, Gianni [1 ]
Ficara, Domenico [1 ]
Giordano, Stefano [1 ]
Procissi, Gregorio [1 ]
Vitucci, Fabio
机构
[1] Univ Pisa, Dept Informat Engn, I-56100 Pisa, Italy
来源
IEEE NETWORK | 2009年 / 23卷 / 01期
关键词
Engines; Finite impulse response filter; Layout; Matched filters; Memory management; Pattern matching; Radiation detectors;
D O I
10.1109/MNET.2009.4804321
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Standard pattern-matching methods used for deep packet inspection and network security can be evaded by means of TCP and IP fragmentation. To detect such attacks, intrusion detection systems must reassemble packets before applying matching algorithms, thus requiring a large amount of memory and time to respond to the threat. In the literature, only a few efforts proposed a method to detect evasion attacks at high speed without reassembly. The aim of this article is to introduce an efficient system for anti-evasion that can be implemented in real devices. It is based on counting Bloom filters and exploits their capabilities to quickly update the string set and deal with partial signatures. In this way, the detection of attacks and almost all of the traffic processing is performed in the fast data path, thus improving the scalability of intrusion detection systems.
引用
收藏
页码:30 / 35
页数:6
相关论文
共 12 条
[1]  
Artan NS, 2005, GLOB TELECOMM CONF, P1811
[2]  
Bonomi F, 2006, LECT NOTES COMPUT SC, V4168, P684
[3]   Deep packet inspection using parallel bloom filters [J].
Dharmapurikar, S ;
Krishnamurthy, P ;
Sproull, TS ;
Lockwood, JW .
IEEE MICRO, 2004, 24 (01) :52-61
[4]  
Fan L., 1998, SUMMARY CACHE, V28, P254
[5]  
FICARA D, 2008, P INFOCOM 08 APR
[6]  
FICARA D, 2008, P IEEE ICC 08 MAY
[7]  
Handley M., 2001, SSYM 01, P9
[8]  
NOURANI M, P 16 INT C COMP COMM, P185
[9]  
Song Haoyu., 2005, Proceedings of the 2005 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, SIGCOMM '05, P181, DOI DOI 10.1145/1080091.1080114.
[10]   Detecting evasion attacks at high speeds without reassembly [J].
Varghese, George ;
Fingerhut, J. Andrew ;
Bonomi, Flavio .
ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2006, 36 (04) :327-338