Research of pattern matching in intrusion detection

被引:1
|
作者
Huang, JC [1 ]
Tian, JF [1 ]
Du, RZ [1 ]
Zhai, JQ [1 ]
机构
[1] Hebei Univ, Fac Math & Comp Sci, Baoding 071002, Hebei, Peoples R China
来源
2003 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-5, PROCEEDINGS | 2003年
关键词
intrusion detection; pattern matching; trinary tree; automaton;
D O I
10.1109/ICMLC.2003.1259803
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper studies the method of pattern matching in intrusion detection, analyzes the fault and lack of the current methods and proposes a trinary-tree-based automaton method, which avoids some lacks resulting from the changing of the node amount in traditional tree structure. In addition, during matching this method jumps some letters with unsuccessful information, so it obtains higher speed.
引用
收藏
页码:1877 / 1882
页数:6
相关论文
共 50 条
  • [11] The Research and Amelioration of Pattern-matching Algorithm in Intrusion Detection System
    Wu, Pei-fei
    Shen, Hai-juan
    2012 IEEE 14TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS & 2012 IEEE 9TH INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS (HPCC-ICESS), 2012, : 1712 - 1715
  • [12] Algorithms to speedup pattern matching for network intrusion detection systems
    Zheng, Kai
    Cai, Zhiping
    Zhang, Xin
    Wang, Zhijun
    Yang, Baohua
    COMPUTER COMMUNICATIONS, 2015, 62 : 47 - 58
  • [13] The improving pattern matching algorithm of intrusion detection
    Qu, Zhaoyang
    Huang, Xiaobo
    CEIS 2011, 2011, 15
  • [14] Hybrid pattern matching for trusted intrusion detection
    Soewito, Benfano
    Vespa, Lucas
    Weng, Ning
    Wang, Haibo
    SECURITY AND COMMUNICATION NETWORKS, 2011, 4 (01) : 33 - 43
  • [15] The design and research of Intrusion Detection System based on pattern matching and statistical analysis
    Tian, JF
    Zhang, Z
    Zhao, WD
    Proceedings of the 11th Joint International Computer Conference, 2005, : 324 - 327
  • [16] Distributed Hierarchical Pattern-Matching for Network Intrusion Detection
    Baig, Zubair
    Salah, Khaled
    JOURNAL OF INTERNET TECHNOLOGY, 2016, 17 (02): : 167 - 178
  • [17] Piranha: Fast and memory-efficient pattern matching for intrusion detection
    Antonatos, S
    Polychronakis, M
    Akritidis, P
    Anagnostakis, KG
    Markatos, EP
    SECURITY AND PRIVACY IN THE AGE OF UBIQUITOUS COMPUTING, 2005, 181 : 393 - 408
  • [18] Improvement on intrusion detection technology based on protocol analysis and pattern matching
    Hu L.
    Tang K.
    Ku Y.
    Zhao K.
    Journal of Convergence Information Technology, 2010, 5 (03) : 86 - 94
  • [19] A Survey of Pattern Matching Algorithm in Intrusion Detection System
    Gharaee, Hossein
    Seifi, Shokoufeh
    Monsefan, Nima
    2014 7th International Symposium on Telecommunications (IST), 2014, : 946 - 953
  • [20] An improved multi-pattern matching algorithms in intrusion detection
    Cheng Ke-qin
    Deng Lin
    Wang Hui
    2013 FIFTH INTERNATIONAL CONFERENCE ON MEASURING TECHNOLOGY AND MECHATRONICS AUTOMATION (ICMTMA 2013), 2013, : 203 - 205