Research of pattern matching in intrusion detection

被引:1
|
作者
Huang, JC [1 ]
Tian, JF [1 ]
Du, RZ [1 ]
Zhai, JQ [1 ]
机构
[1] Hebei Univ, Fac Math & Comp Sci, Baoding 071002, Hebei, Peoples R China
来源
2003 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-5, PROCEEDINGS | 2003年
关键词
intrusion detection; pattern matching; trinary tree; automaton;
D O I
10.1109/ICMLC.2003.1259803
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper studies the method of pattern matching in intrusion detection, analyzes the fault and lack of the current methods and proposes a trinary-tree-based automaton method, which avoids some lacks resulting from the changing of the node amount in traditional tree structure. In addition, during matching this method jumps some letters with unsuccessful information, so it obtains higher speed.
引用
收藏
页码:1877 / 1882
页数:6
相关论文
共 50 条
  • [41] Deep learning-based feature extraction and optimizing pattern matching for intrusion detection using finite state machine
    Abbasi, Junaid Shabbir
    Bashir, Faisal
    Qureshi, Kashif Naseer
    ul Islam, Muhammad Najam
    Jeon, Gwanggil
    COMPUTERS & ELECTRICAL ENGINEERING, 2021, 92
  • [42] MapReduce Accelerated Signature-Based Intrusion Detection Mechanism (IDM) with Pattern Matching Mechanism
    Rao, Chinta Someswara
    Raju, K. Butchi
    SOFT COMPUTING IN DATA ANALYTICS, SCDA 2018, 2019, 758 : 157 - 164
  • [43] Exhaust: Optimizing Wu-Manber Pattern Matching for Intrusion Detection using Bloom Filters
    Aldwairi, Monther
    Al-Khamaiseh, Koloud
    2015 2ND WORLD SYMPOSIUM ON WEB APPLICATIONS AND NETWORKING (WSWAN), 2015,
  • [44] Research and Improvement of BM Pattern Matching Algorithm
    Li Juan
    Yan Lina
    Ran Haodan
    Huang Tao
    2020 INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND COMPUTER ENGINEERING (ICAICE 2020), 2020, : 204 - 210
  • [45] A Non-Computational Intensive Pre-filter for Pattern Matching in Network Intrusion Detection Systems
    Huang, Nen-Fu
    Chu, Yen-Ming
    Tzang, Yih-Jou
    Chen, Jian-Lin
    Hun, Hsien-Wei
    Shih, Ming-Chang
    Kao, Chia-Nan
    GLOBECOM 2006 - 2006 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2006,
  • [46] A Multiple Regular Expressions Matching Architecture for Network Intrusion Detection System
    Zhang, Wei
    Song, Tian
    Wang, Dongsheng
    2008 THIRD INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND NETWORKING IN CHINA, VOLS 1-3, 2008, : 653 - +
  • [47] A Multiple Pattern Matching Method for Malicious Code Detection
    Huang, Der-Chen
    Lo, Hung-Cheng
    Lai, Ping-Liang
    Chen, Wei-Ming
    JOURNAL OF INTERNET TECHNOLOGY, 2012, 13 (02): : 181 - 193
  • [48] A Synergetic Pattern Matching Method Based-on DHT Structure for Intrusion Detection in Large-scale Network
    Ma, Dong
    Wang, Yongjun
    Fu, Zhenlong
    CEIS 2011, 2011, 15
  • [49] A novel hierarchical matching algorithm for intrusion detection systems
    Sheu, TF
    Huang, NF
    Lee, HP
    GLOBECOM '05: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-6: DISCOVERY PAST AND FUTURE, 2005, : 1691 - 1695
  • [50] On a pattern-oriented model for intrusion detection
    Shieh, SP
    Gligor, VD
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 1997, 9 (04) : 661 - 667