Exhaust: Optimizing Wu-Manber Pattern Matching for Intrusion Detection using Bloom Filters

被引:0
作者
Aldwairi, Monther [1 ,2 ]
Al-Khamaiseh, Koloud [3 ]
机构
[1] Zayed Univ, Coll Technol Innovat, POB 144534, Abu Dhabi, U Arab Emirates
[2] Jordan Univ Sci & Technol, Dept Network Engn & Secur, Irbid 22110, Jordan
[3] Tafila Tech Univ, Dept Elect & Commun Engn & Comp Engn, Tafila 66110, Jordan
来源
2015 2ND WORLD SYMPOSIUM ON WEB APPLICATIONS AND NETWORKING (WSWAN) | 2015年
关键词
Bloom Filters; Intrusion Detection Systems; Pattern Matching; Network Security; Wu-Manber; ALGORITHM; SEARCH;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Intrusion detection systems are widely accepted as one of the main tools for monitoring and analyzing host and network traffic to protect data from illegal access or modification. Almost all types of signature-based intrusion detection systems must employ a pattern matching algorithm to inspect packets for malicious signatures. Unfortunately, pattern matching algorithms dominate the execution time and have become the bottleneck. To remedy that, we introduce a new software-based pattern matching algorithm that modifies Wu-Manber pattern matching algorithm using Bloom filters. The Bloom filter acts as an exclusion filter to reduce the number of searches to the large HASH table. The HASH table is accessed if there is a probable match represented by a shift value of zero. On average the HASH table search is skipped 10.6% of the time with a worst case average running time speedup over Wu-Manber of 33%. The maximum overhead incurred on preprocessing time is 1.1% and the worst case increase in memory usage was limited to 0.33%
引用
收藏
页数:6
相关论文
共 17 条
[1]   EFFICIENT STRING MATCHING - AID TO BIBLIOGRAPHIC SEARCH [J].
AHO, AV ;
CORASICK, MJ .
COMMUNICATIONS OF THE ACM, 1975, 18 (06) :333-340
[2]  
Aldwairi M, 2006, THESIS
[3]  
ALDWAIRI M, 2005, SIGARCH COMPUT ARCHI, V33, P99
[4]  
[Anonymous], 13 USENIX SYST ADM C
[5]  
[Anonymous], TR9417 U AR TUSC
[6]  
[Anonymous], IEEE COMPUTER MAGAZI
[7]  
ANTONATOS S, 2004, ACM SIGSOFT SOFTWARE, V29, P207, DOI DOI 10.1145/974043.974078
[8]  
Baeza-Yate R., 2011, MODERN INFORM RETRIE
[9]  
Beale Jay., 2007, Snort: IDS and IPS toolkit
[10]   SPACE/TIME TRADE/OFFS IN HASH CODING WITH ALLOWABLE ERRORS [J].
BLOOM, BH .
COMMUNICATIONS OF THE ACM, 1970, 13 (07) :422-&