Research on Efficient Pattern Matching Algorithms in Intrusion Detection System

被引:0
|
作者
Liu-xiaoxing [1 ]
Yu-ning [1 ]
机构
[1] Hebei Coll Sci & Technol, Baoding 071000, Peoples R China
来源
2014 7TH INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTATION TECHNOLOGY AND AUTOMATION (ICICTA) | 2014年
关键词
Intrusion Detection; Boyer-Moore (BM); Aho-Corasic (AC); Comments-Walter; IACBM;
D O I
10.1109/ICICTA.2014.129
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The development of computer network technology has changed the single machine oriented calculation model, however, the risks of network intrusion also are increasing greatly. Design security measures to prevent unauthorized access to system resources and data become an important and urgent problem in the network security field. At present, it is not realistic to completely avoid the security incidents. What researchers can do is try to discover the intrusion as soon as possible to take effective measures to plug the loopholes and repair the system, which is called as intrusion detection research. Intrusion detection plays an important role in system security. This paper firstly presents the necessity, definition and principles of intrusion detection. Then we introduce the most popular intrusion detection algorithms: Boyer-Moore (BM) and Aho-Corasic (AC) algorithms. Finally the improved algorithms based on them, Comments-Walter algorithm and IACBM, are presented in this paper.
引用
收藏
页码:509 / 512
页数:4
相关论文
共 50 条
  • [41] PROPOSAL OF ALGORITHMS FOR STATISTICAL INTRUSION DETECTION
    Cisar, Petar
    Cisar, Sanja Maravic
    Ivkovic, Miodrag
    Milanov, Dusanka
    Markoski, Branko
    METALURGIA INTERNATIONAL, 2012, 17 (05): : 73 - 77
  • [42] An efficient network intrusion detection
    Chen, Chia-Mei
    Chen, Ya-Lin
    Lin, Hsiao-Chung
    COMPUTER COMMUNICATIONS, 2010, 33 (04) : 477 - 484
  • [43] Efficient Intrusion Detection Algorithms for Smart Cities-Based Wireless Sensing Technologies
    Ramadan, Rabie A.
    JOURNAL OF SENSOR AND ACTUATOR NETWORKS, 2020, 9 (03)
  • [44] Research on Intrusion Detection System Based on Integrated Transfer Learning
    Hu, Jian
    Zhou, Jing
    Su, Yongdong
    Xiao, Peng
    Wang, Hailin
    2020 5TH INTERNATIONAL CONFERENCE ON SMART GRID AND ELECTRICAL AUTOMATION (ICSGEA 2020), 2020, : 300 - 305
  • [45] Research and Design of Subway BAS Intrusion Detection Expert System
    Yu, Jianguo
    Tian, Pei
    Feng, Haonan
    Xiao, Yan
    PROCEEDINGS OF 2018 IEEE 3RD ADVANCED INFORMATION TECHNOLOGY, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (IAEAC 2018), 2018, : 152 - 156
  • [46] Research on Immune based Adaptive Intrusion Detection System Model
    Deng, Lei
    Gao, De-yuan
    NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 488 - 491
  • [47] Application Research on Retrospective Analysis System in Network Intrusion Detection
    Wu, Wei
    Cheng, Nan
    Wang, Yubin
    2014 TENTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2014, : 624 - 627
  • [48] Research on Intrusion Detection System Model Based on Data Mining
    Zhu Limiao
    Huang Hua
    Zheng Hao
    2012 FOURTH INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY (MINES 2012), 2012, : 113 - 116
  • [49] An Efficient Intrusion Detection Approach for Visual Sensor Networks Based on Traffic Pattern Learning
    Huang, Kaixing
    Zhang, Qi
    Zhou, Chunjie
    Xiong, Naixue
    Qin, Yuanqing
    IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2017, 47 (10): : 2704 - 2713
  • [50] Intrusion Detection Research of Control System Based on Robot Arm
    Zhang, Lei
    Xie, Lun
    Hu, Bo
    Wang, Zhi-liang
    Ren, Fuji
    2017 IEEE INTERNATIONAL CONFERENCE ON ROBOTICS AND BIOMIMETICS (IEEE ROBIO 2017), 2017, : 2657 - 2662