Research on Efficient Pattern Matching Algorithms in Intrusion Detection System

被引:0
|
作者
Liu-xiaoxing [1 ]
Yu-ning [1 ]
机构
[1] Hebei Coll Sci & Technol, Baoding 071000, Peoples R China
来源
2014 7TH INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTATION TECHNOLOGY AND AUTOMATION (ICICTA) | 2014年
关键词
Intrusion Detection; Boyer-Moore (BM); Aho-Corasic (AC); Comments-Walter; IACBM;
D O I
10.1109/ICICTA.2014.129
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The development of computer network technology has changed the single machine oriented calculation model, however, the risks of network intrusion also are increasing greatly. Design security measures to prevent unauthorized access to system resources and data become an important and urgent problem in the network security field. At present, it is not realistic to completely avoid the security incidents. What researchers can do is try to discover the intrusion as soon as possible to take effective measures to plug the loopholes and repair the system, which is called as intrusion detection research. Intrusion detection plays an important role in system security. This paper firstly presents the necessity, definition and principles of intrusion detection. Then we introduce the most popular intrusion detection algorithms: Boyer-Moore (BM) and Aho-Corasic (AC) algorithms. Finally the improved algorithms based on them, Comments-Walter algorithm and IACBM, are presented in this paper.
引用
收藏
页码:509 / 512
页数:4
相关论文
共 50 条
  • [21] Research on distributed intrusion detection system
    Wang, Zeng-Quan
    Wang, Hui-Qiang
    Zhao, Qian
    Zhang, Rui-Jie
    PROCEEDINGS OF 2006 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2006, : 181 - +
  • [22] Improvement on intrusion detection technology based on protocol analysis and pattern matching
    Hu L.
    Tang K.
    Ku Y.
    Zhao K.
    Journal of Convergence Information Technology, 2010, 5 (03) : 86 - 94
  • [23] Research and Improvement of Adjustment Algorithm of Matching Rules of Intrusion Detection
    Zhou, Yan-Sen
    Yang, Jin-Ran
    NETWORK COMPUTING AND INFORMATION SECURITY, 2012, 345 : 372 - 379
  • [24] Real-Time Intrusion Detection with Genetic, Fuzzy, Pattern Matching Algorithm
    Kadam, Priya Uttam
    Deshmukh, Manjusha
    PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT, 2016, : 753 - 758
  • [25] Research on Intrusion Detection System based on IRBF
    Peng Yichun
    Niu Yi
    Hu Qiwei
    PROCEEDINGS OF THE 2012 EIGHTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS 2012), 2012, : 544 - 548
  • [26] Research on the System Model of Network Intrusion Detection
    Yang Yunfeng
    PROCEEDINGS OF THE 2012 INTERNATIONAL CONFERENCE OF MODERN COMPUTER SCIENCE AND APPLICATIONS, 2013, 191 : 185 - 190
  • [27] Research on Network Intrusion Detection Method based on Regular Expression Matching
    Wang, Yi
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (07): : 185 - 194
  • [28] Survey and taxonomy of feature selection algorithms in intrusion detection system
    Chen, You
    Li, Yang
    Cheng, Xue-Qi
    Guo, Li
    INFORMATION SECURITY AND CRYPTOLOGY, PROCEEDINGS, 2006, 4318 : 153 - +
  • [29] A Survey on Intrusion Detection System Using Machine Learning Algorithms
    Gulghane, Shital
    Shingate, Vishal
    Bondgulwar, Shivani
    Awari, Gaurav
    Sagar, Parth
    INNOVATIVE DATA COMMUNICATION TECHNOLOGIES AND APPLICATION, 2020, 46 : 670 - 675
  • [30] Feature Construction Scheme for Efficient Intrusion Detection System
    Kim, Eunhye
    Lee, Seungmin
    Kwon, Kihoon
    Kim, Sehun
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2010, 26 (02) : 527 - 547