Research of pattern matching in intrusion detection

被引:1
|
作者
Huang, JC [1 ]
Tian, JF [1 ]
Du, RZ [1 ]
Zhai, JQ [1 ]
机构
[1] Hebei Univ, Fac Math & Comp Sci, Baoding 071002, Hebei, Peoples R China
来源
2003 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-5, PROCEEDINGS | 2003年
关键词
intrusion detection; pattern matching; trinary tree; automaton;
D O I
10.1109/ICMLC.2003.1259803
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper studies the method of pattern matching in intrusion detection, analyzes the fault and lack of the current methods and proposes a trinary-tree-based automaton method, which avoids some lacks resulting from the changing of the node amount in traditional tree structure. In addition, during matching this method jumps some letters with unsuccessful information, so it obtains higher speed.
引用
收藏
页码:1877 / 1882
页数:6
相关论文
共 50 条
  • [21] Efficient hardware support for pattern matching in network intrusion detection
    Guinde, Nitesh B.
    Ziavras, Sotirios G.
    COMPUTERS & SECURITY, 2010, 29 (07) : 756 - 769
  • [22] Pattern Matching Intrusion Detection Technique for Wireless Sensor Networks
    Kalnoor, Gauri
    Agarkhed, Jayashree
    PROCEEDINGS OF THE 2016 IEEE 2ND INTERNATIONAL CONFERENCE ON ADVANCES IN ELECTRICAL & ELECTRONICS, INFORMATION, COMMUNICATION & BIO INFORMATICS (IEEE AEEICB-2016), 2016, : 724 - 728
  • [23] Variable Length Pattern Matching for Hardware Network Intrusion Detection System
    Chun Jason Xue
    Meilin Liu
    QingFeng Zhuge
    Edwin Hsing-Mean Sha
    Journal of Signal Processing Systems, 2010, 59 : 85 - 93
  • [24] Variable Length Pattern Matching for Hardware Network Intrusion Detection System
    Xue, Chun Jason
    Liu, Meilin
    Zhuge, QingFeng
    Sha, Edwin Hsing-Mean
    JOURNAL OF SIGNAL PROCESSING SYSTEMS FOR SIGNAL IMAGE AND VIDEO TECHNOLOGY, 2010, 59 (01): : 85 - 93
  • [25] Handling Alerts for Intrusion Detection System Using Stateful Pattern Matching
    Chakir, El Mostapha
    Idrissi Khamlichi, Youness
    Moughit, Mohamed
    2016 4TH IEEE INTERNATIONAL COLLOQUIUM ON INFORMATION SCIENCE AND TECHNOLOGY (CIST), 2016, : 139 - 144
  • [26] Pattern Matching Algorithms for Intrusion Detection and Prevention System: A Comparative Analysis
    Gupta, Vibha
    Singh, Maninder
    Bhalla, Vinod K.
    2014 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2014, : 50 - 54
  • [27] Research and Improvement of Adjustment Algorithm of Matching Rules of Intrusion Detection
    Zhou, Yan-Sen
    Yang, Jin-Ran
    NETWORK COMPUTING AND INFORMATION SECURITY, 2012, 345 : 372 - 379
  • [28] A pattern-matching co-processor for network intrusion detection systems
    Clark, CR
    Schimmel, DE
    2003 IEEE INTERNATIONAL CONFERENCE ON FIELD-PROGRAMMABLE TECHNOLOGY (FPT), PROCEEDINGS, 2003, : 68 - 74
  • [29] Two-phase Pattern Matching for Regular Expressions in Intrusion Detection Systems
    Yang, Chang-Ching
    Cheng, Chen-Mou
    Wang, Sheng-De
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2010, 26 (05) : 1563 - 1582
  • [30] Real-Time Intrusion Detection with Genetic, Fuzzy, Pattern Matching Algorithm
    Kadam, Priya Uttam
    Deshmukh, Manjusha
    PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT, 2016, : 753 - 758