Research on Efficient Pattern Matching Algorithms in Intrusion Detection System

被引:0
|
作者
Liu-xiaoxing [1 ]
Yu-ning [1 ]
机构
[1] Hebei Coll Sci & Technol, Baoding 071000, Peoples R China
关键词
Intrusion Detection; Boyer-Moore (BM); Aho-Corasic (AC); Comments-Walter; IACBM;
D O I
10.1109/ICICTA.2014.129
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The development of computer network technology has changed the single machine oriented calculation model, however, the risks of network intrusion also are increasing greatly. Design security measures to prevent unauthorized access to system resources and data become an important and urgent problem in the network security field. At present, it is not realistic to completely avoid the security incidents. What researchers can do is try to discover the intrusion as soon as possible to take effective measures to plug the loopholes and repair the system, which is called as intrusion detection research. Intrusion detection plays an important role in system security. This paper firstly presents the necessity, definition and principles of intrusion detection. Then we introduce the most popular intrusion detection algorithms: Boyer-Moore (BM) and Aho-Corasic (AC) algorithms. Finally the improved algorithms based on them, Comments-Walter algorithm and IACBM, are presented in this paper.
引用
收藏
页码:509 / 512
页数:4
相关论文
共 50 条
  • [1] EFFICIENT MULTIPLE PATTERN MATCHING ALGORITHMS FOR NETWORK INTRUSION DETECTION SYSTEMS
    Lee, Sunho
    Kim, Dong Kyue
    2009 IEEE INTERNATIONAL CONFERENCE ON NETWORK INFRASTRUCTURE AND DIGITAL CONTENT, PROCEEDINGS, 2009, : 609 - 613
  • [2] Research of pattern matching in intrusion detection
    Huang, JC
    Tian, JF
    Du, RZ
    Zhai, JQ
    2003 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-5, PROCEEDINGS, 2003, : 1877 - 1882
  • [3] Pattern Matching Algorithms for Intrusion Detection and Prevention System: A Comparative Analysis
    Gupta, Vibha
    Singh, Maninder
    Bhalla, Vinod K.
    2014 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2014, : 50 - 54
  • [4] Comparison and evaluation of pattern matching algorithms for intrusion detection
    Sapats, Martins
    Paulins, Nauris
    AICT 2013: APPLIED INFORMATION AND COMMUNICATION TECHNOLOGIES, 2013, : 36 - 42
  • [5] Multi-Pattern String Matching Algorithms Comparison for Intrusion Detection System
    Hasan, Awsan A.
    Rashid, Nur' Aini Abdul
    Abdulrazzaq, Atheer A.
    INTERNATIONAL CONFERENCE ON QUANTITATIVE SCIENCES AND ITS APPLICATIONS (ICOQSIA 2014), 2014, 1635 : 27 - 34
  • [6] The Research and Amelioration of Pattern-matching Algorithm in Intrusion Detection System
    Wu, Pei-fei
    Shen, Hai-juan
    2012 IEEE 14TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS & 2012 IEEE 9TH INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS (HPCC-ICESS), 2012, : 1712 - 1715
  • [7] Efficient Pattern Matching Algorithm for Intrusion Detection Systems
    Yang, Wenjun
    SENSORS, MECHATRONICS AND AUTOMATION, 2014, 511-512 : 1178 - 1184
  • [8] An Efficient Pattern Matching Algorithm for Intrusion Detection Systems
    Anithakumari, S.
    Chithraprasad, D.
    2009 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE, VOLS 1-3, 2009, : 223 - +
  • [9] Efficient Pattern Matching on GPUs for Intrusion Detection Systems
    Tumeo, Antonino
    Villa, Oreste
    Sciuto, Donatella
    PROCEEDINGS OF THE 2010 COMPUTING FRONTIERS CONFERENCE (CF 2010), 2010, : 87 - 88
  • [10] Algorithms to speedup pattern matching for network intrusion detection systems
    Zheng, Kai
    Cai, Zhiping
    Zhang, Xin
    Wang, Zhijun
    Yang, Baohua
    COMPUTER COMMUNICATIONS, 2015, 62 : 47 - 58