Research on Efficient Pattern Matching Algorithms in Intrusion Detection System

被引:0
|
作者
Liu-xiaoxing [1 ]
Yu-ning [1 ]
机构
[1] Hebei Coll Sci & Technol, Baoding 071000, Peoples R China
来源
2014 7TH INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTATION TECHNOLOGY AND AUTOMATION (ICICTA) | 2014年
关键词
Intrusion Detection; Boyer-Moore (BM); Aho-Corasic (AC); Comments-Walter; IACBM;
D O I
10.1109/ICICTA.2014.129
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The development of computer network technology has changed the single machine oriented calculation model, however, the risks of network intrusion also are increasing greatly. Design security measures to prevent unauthorized access to system resources and data become an important and urgent problem in the network security field. At present, it is not realistic to completely avoid the security incidents. What researchers can do is try to discover the intrusion as soon as possible to take effective measures to plug the loopholes and repair the system, which is called as intrusion detection research. Intrusion detection plays an important role in system security. This paper firstly presents the necessity, definition and principles of intrusion detection. Then we introduce the most popular intrusion detection algorithms: Boyer-Moore (BM) and Aho-Corasic (AC) algorithms. Finally the improved algorithms based on them, Comments-Walter algorithm and IACBM, are presented in this paper.
引用
收藏
页码:509 / 512
页数:4
相关论文
共 50 条
  • [31] Attack pattern analysis framework for multiagent intrusion detection system
    Kołaczek G.
    Juszczyszyn K.
    International Journal of Computational Intelligence Systems, 2008, 1 (3) : 215 - 224
  • [32] ATTACK PATTERN ANALYSIS FRAMEWORK FOR MULTIAGENT INTRUSION DETECTION SYSTEM
    Kolaczek, Grzegorz
    Juszczyszyn, Krzysztof
    INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE SYSTEMS, 2008, 1 (03) : 215 - 224
  • [33] Using Fuzzy Expert System Based on Genetic Algorithms for Intrusion Detection System
    Wang Yunwu
    2009 INTERNATIONAL FORUM ON INFORMATION TECHNOLOGY AND APPLICATIONS, VOL 2, PROCEEDINGS, 2009, : 221 - +
  • [34] A Multiple Regular Expressions Matching Architecture for Network Intrusion Detection System
    Zhang, Wei
    Song, Tian
    Wang, Dongsheng
    2008 THIRD INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND NETWORKING IN CHINA, VOLS 1-3, 2008, : 653 - +
  • [35] Research in Intrusion Detection System Based on Mobile Agent
    Hou, Zhisong
    Yu, Zhou
    Zheng, Wei
    Zuo, Xiangang
    INFORMATION COMPUTING AND APPLICATIONS, 2011, 7030 : 233 - 240
  • [36] Research on the application of honeypot technology in Intrusion Detection System
    Suo, Xiangfeng
    Han, Xue
    Gao, Yunhui
    PROCEEDINGS OF 2014 IEEE WORKSHOP ON ADVANCED RESEARCH AND TECHNOLOGY IN INDUSTRY APPLICATIONS (WARTIA), 2014, : 1030 - 1032
  • [37] Research of Intrusion Detection System Object Oriented Modeling
    Li, Linglin
    Tang, Jinpeng
    APPLIED MECHANICS, MATERIALS AND MANUFACTURING IV, 2014, 670-671 : 1507 - 1510
  • [38] A Time- and Memory-Efficient String Matching Algorithm for Intrusion Detection Systems
    Sheu, Tzu-Fang
    Huang, Nen-Fu
    Lee, Hsiao-Ping
    GLOBECOM 2006 - 2006 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2006,
  • [39] Grid-Aware Intrusion Detection System using Gossip Algorithms
    Ungureanu, Ionut
    Leordeanu, Catalin
    Cristea, Valentin
    12TH INTERNATIONAL SYMPOSIUM ON SYMBOLIC AND NUMERIC ALGORITHMS FOR SCIENTIFIC COMPUTING (SYNASC 2010), 2011, : 286 - 292
  • [40] A Review of Research Works on Supervised Learning Algorithms for SCADA Intrusion Detection and Classification
    Alimi, Oyeniyi Akeem
    Ouahada, Khmaies
    Abu-Mahfouz, Adnan M.
    Rimer, Suvendi
    Alimi, Kuburat Oyeranti Adefemi
    SUSTAINABILITY, 2021, 13 (17)