Research on Efficient Pattern Matching Algorithms in Intrusion Detection System

被引:0
|
作者
Liu-xiaoxing [1 ]
Yu-ning [1 ]
机构
[1] Hebei Coll Sci & Technol, Baoding 071000, Peoples R China
关键词
Intrusion Detection; Boyer-Moore (BM); Aho-Corasic (AC); Comments-Walter; IACBM;
D O I
10.1109/ICICTA.2014.129
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The development of computer network technology has changed the single machine oriented calculation model, however, the risks of network intrusion also are increasing greatly. Design security measures to prevent unauthorized access to system resources and data become an important and urgent problem in the network security field. At present, it is not realistic to completely avoid the security incidents. What researchers can do is try to discover the intrusion as soon as possible to take effective measures to plug the loopholes and repair the system, which is called as intrusion detection research. Intrusion detection plays an important role in system security. This paper firstly presents the necessity, definition and principles of intrusion detection. Then we introduce the most popular intrusion detection algorithms: Boyer-Moore (BM) and Aho-Corasic (AC) algorithms. Finally the improved algorithms based on them, Comments-Walter algorithm and IACBM, are presented in this paper.
引用
收藏
页码:509 / 512
页数:4
相关论文
共 50 条
  • [31] Design of Intrusion Detection System Based on a New Pattern Matching Algorithm
    Zhang Hu
    2009 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND TECHNOLOGY, VOL I, PROCEEDINGS, 2009, : 545 - 548
  • [32] High-throughput intrusion detection system with parallel pattern matching
    Hsiao, Yi-Mao
    Chen, Ming-Jen
    Chu, Yuan-Sun
    Huang, Chung-Hsun
    IEICE ELECTRONICS EXPRESS, 2012, 9 (18): : 1467 - 1472
  • [33] Variable Length Pattern Matching for Hardware Network Intrusion Detection System
    Chun Jason Xue
    Meilin Liu
    QingFeng Zhuge
    Edwin Hsing-Mean Sha
    Journal of Signal Processing Systems, 2010, 59 : 85 - 93
  • [34] EFFICIENT PATTERN MATCHING ALGORITHMS IN IDS
    Salve, Vandana B.
    Savalkar, Vishwayogita
    Mhatre, Sonali
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON INVENTIVE SYSTEMS AND CONTROL (ICISC 2018), 2018, : 1083 - 1089
  • [35] Robust and Fast Pattern Matching for Intrusion Detection
    Namjoshi, Kedar
    Narlikar, Girija
    2010 PROCEEDINGS IEEE INFOCOM, 2010,
  • [36] On the fly pattern matching for intrusion detection with Snort
    Abbes, T
    Bouhoula, A
    Rusinowitch, M
    ANNALS OF TELECOMMUNICATIONS, 2004, 59 (9-10) : 1045 - 1071
  • [37] Research on intrusion detection based on Boyer-Moore pattern matching algorithm
    Li, Yulong
    Li, Chenhao
    Jiao, Yang
    Zhao, Guogang
    Liu, Yang
    Zhang, Tian
    PROCEEDINGS OF 2023 7TH INTERNATIONAL CONFERENCE ON ELECTRONIC INFORMATION TECHNOLOGY AND COMPUTER ENGINEERING, EITCE 2023, 2023, : 1490 - 1494
  • [38] Hybrid pattern matching for trusted intrusion detection
    Soewito, Benfano
    Vespa, Lucas
    Weng, Ning
    Wang, Haibo
    SECURITY AND COMMUNICATION NETWORKS, 2011, 4 (01) : 33 - 43
  • [39] IMPROVEMENT OF ALGORITHM FOR PATTERN MATCHING IN INTRUSION DETECTION
    Zhao, Dongcan
    Zhu, Xiaomin
    Xu, Tong
    2013 5TH IEEE INTERNATIONAL CONFERENCE ON BROADBAND NETWORK & MULTIMEDIA TECHNOLOGY (IC-BNMT), 2013, : 281 - 284
  • [40] An Effective Pattern Matching Algorithm for Intrusion Detection
    Zhang, Qing-Qing
    Zhang, Qian
    Feng, Yue-jiang
    MECHATRONICS ENGINEERING, COMPUTING AND INFORMATION TECHNOLOGY, 2014, 556-562 : 3010 - +