Research on Efficient Pattern Matching Algorithms in Intrusion Detection System

被引:0
|
作者
Liu-xiaoxing [1 ]
Yu-ning [1 ]
机构
[1] Hebei Coll Sci & Technol, Baoding 071000, Peoples R China
关键词
Intrusion Detection; Boyer-Moore (BM); Aho-Corasic (AC); Comments-Walter; IACBM;
D O I
10.1109/ICICTA.2014.129
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The development of computer network technology has changed the single machine oriented calculation model, however, the risks of network intrusion also are increasing greatly. Design security measures to prevent unauthorized access to system resources and data become an important and urgent problem in the network security field. At present, it is not realistic to completely avoid the security incidents. What researchers can do is try to discover the intrusion as soon as possible to take effective measures to plug the loopholes and repair the system, which is called as intrusion detection research. Intrusion detection plays an important role in system security. This paper firstly presents the necessity, definition and principles of intrusion detection. Then we introduce the most popular intrusion detection algorithms: Boyer-Moore (BM) and Aho-Corasic (AC) algorithms. Finally the improved algorithms based on them, Comments-Walter algorithm and IACBM, are presented in this paper.
引用
收藏
页码:509 / 512
页数:4
相关论文
共 50 条
  • [41] Improved Algorithm of pattern matching for Intrusion Detection
    Liu Zhen
    Xu Su
    Zhang Jue
    MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 446 - 449
  • [42] The improving pattern matching algorithm of intrusion detection
    Qu, Zhaoyang
    Huang, Xiaobo
    CEIS 2011, 2011, 15
  • [43] The research of intelligent intrusion detection system based on genetic algorithms
    Wu Duosheng
    Wang Fan
    Wang Xiaolin
    ISTM/2007: 7TH INTERNATIONAL SYMPOSIUM ON TEST AND MEASUREMENT, VOLS 1-7, CONFERENCE PROCEEDINGS, 2007, : 6226 - 6229
  • [44] EFFICIENT RANDOMIZED PATTERN-MATCHING ALGORITHMS
    KARP, RM
    RABIN, MO
    IBM JOURNAL OF RESEARCH AND DEVELOPMENT, 1987, 31 (02) : 249 - 260
  • [45] A fast multiple pattern matching using in intrusion detection
    Xin, Yang
    Wei, Jing-Zhi
    Niu, Xin-Xin
    Gu, Yang
    Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2008, 31 (03): : 19 - 23
  • [46] Predictive Pattern Matching for Scalable Network Intrusion Detection
    Vespa, Lucas
    Mathew, Mini
    Weng, Ning
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2009, 5927 : 254 - 267
  • [47] Pattern matching acceleration for network intrusion detection systems
    Kim, S
    EMBEDDED COMPUTER SYSTEMS: ARCHITECTURES, MODELING, AND SIMULATION, 2005, 3553 : 289 - 298
  • [48] Efficient pattern matching algorithm for security and Binary Search Tree (BST) based memory system in Wireless Intrusion Detection System (WIDS)
    Suresh, P.
    Sukumar, R.
    Ayyasamy, S.
    COMPUTER COMMUNICATIONS, 2020, 151 : 111 - 118
  • [49] FPGA-Based Parallel Pattern Matching Algorithm for Network Intrusion Detection System
    Yu, Jing
    Yang, Bo
    Sun, Ruiyuan
    Chen, Zhenxiang
    MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 458 - 461
  • [50] A fast pattern matching algorithm for network processor-based intrusion detection system
    Liu, RT
    Huang, NF
    Kao, CN
    Chen, CH
    CONFERENCE PROCEEDINGS OF THE 2004 IEEE INTERNATIONAL PERFORMANCE, COMPUTING, AND COMMUNICATIONS CONFERENCE, 2004, : 271 - 275