Research on Efficient Pattern Matching Algorithms in Intrusion Detection System

被引:0
|
作者
Liu-xiaoxing [1 ]
Yu-ning [1 ]
机构
[1] Hebei Coll Sci & Technol, Baoding 071000, Peoples R China
关键词
Intrusion Detection; Boyer-Moore (BM); Aho-Corasic (AC); Comments-Walter; IACBM;
D O I
10.1109/ICICTA.2014.129
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The development of computer network technology has changed the single machine oriented calculation model, however, the risks of network intrusion also are increasing greatly. Design security measures to prevent unauthorized access to system resources and data become an important and urgent problem in the network security field. At present, it is not realistic to completely avoid the security incidents. What researchers can do is try to discover the intrusion as soon as possible to take effective measures to plug the loopholes and repair the system, which is called as intrusion detection research. Intrusion detection plays an important role in system security. This paper firstly presents the necessity, definition and principles of intrusion detection. Then we introduce the most popular intrusion detection algorithms: Boyer-Moore (BM) and Aho-Corasic (AC) algorithms. Finally the improved algorithms based on them, Comments-Walter algorithm and IACBM, are presented in this paper.
引用
收藏
页码:509 / 512
页数:4
相关论文
共 50 条
  • [21] Piranha: Fast and memory-efficient pattern matching for intrusion detection
    Antonatos, S
    Polychronakis, M
    Akritidis, P
    Anagnostakis, KG
    Markatos, EP
    SECURITY AND PRIVACY IN THE AGE OF UBIQUITOUS COMPUTING, 2005, 181 : 393 - 408
  • [22] Shift-or circuit for efficient network intrusion detection pattern matching
    Roan, Huang-Chun
    Hwang, Wen-Jyi
    Lo, Chia-Tien Dan
    2006 INTERNATIONAL CONFERENCE ON FIELD PROGRAMMABLE LOGIC AND APPLICATIONS, PROCEEDINGS, 2006, : 785 - 790
  • [23] Piranha: Fast and memory-efficient pattern matching for intrusion detection
    et al; International Communication Foundation; OTSUKA CORPORATION OTSUKA CORPORATION; Support Cent. Adv. Telecommun. Technol. Res.; Systems Development Laboratory,Hitachi Ltd; The Telecommunication Advancement Foundation (Springer Science and Business Media, LLC):
  • [24] Efficient algorithms for intrusion detection
    Boora, NK
    Bhattacharyya, C
    Gopinath, K
    DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, PROCEEDINGS, 2004, 3347 : 346 - 352
  • [25] Research on Intrusion Detection System based on pattern recognition
    Zhu, Youchan
    Zheng, Ying
    NCM 2008 : 4TH INTERNATIONAL CONFERENCE ON NETWORKED COMPUTING AND ADVANCED INFORMATION MANAGEMENT, VOL 1, PROCEEDINGS, 2008, : 609 - 612
  • [26] Efficient Packet Pattern Matching for Gigabit Network Intrusion Detection using GPUs
    Hung, Che-Lun
    Wang, Hsiao-hsi
    Chang, Chin-Yuan
    Lin, Chun-Yuan
    2012 IEEE 14TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS & 2012 IEEE 9TH INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS (HPCC-ICESS), 2012, : 1612 - 1617
  • [27] Variable Length Pattern Matching for Hardware Network Intrusion Detection System
    Xue, Chun Jason
    Liu, Meilin
    Zhuge, QingFeng
    Sha, Edwin Hsing-Mean
    JOURNAL OF SIGNAL PROCESSING SYSTEMS FOR SIGNAL IMAGE AND VIDEO TECHNOLOGY, 2010, 59 (01): : 85 - 93
  • [28] A fast pattern-matching algorithm for network intrusion detection system
    Sung, Jung-Sik
    Kang, Seok-Min
    Kwon, Taeck-Geun
    NETWORKING 2006: NETWORKING TECHNOLOGIES, SERVICES, AND PROTOCOLS; PERFORMANCE OF COMPUTER AND COMMUNICATION NETWORKS; MOBILE AND WIRELESS COMMUNICATIONS SYSTEMS, 2006, 3976 : 1157 - 1162
  • [29] Handling Alerts for Intrusion Detection System Using Stateful Pattern Matching
    Chakir, El Mostapha
    Idrissi Khamlichi, Youness
    Moughit, Mohamed
    2016 4TH IEEE INTERNATIONAL COLLOQUIUM ON INFORMATION SCIENCE AND TECHNOLOGY (CIST), 2016, : 139 - 144
  • [30] Multilevel pattern matching architecture for network intrusion detection and prevention system
    Song, Tian
    Tang, Zhizhong
    Wang, Dongsheng
    EMBEDDED SOFTWARE AND SYSTEMS, PROCEEDINGS, 2007, 4523 : 604 - +