Efficient pattern matching algorithm for security and Binary Search Tree (BST) based memory system in Wireless Intrusion Detection System (WIDS)

被引:8
作者
Suresh, P. [1 ]
Sukumar, R. [2 ]
Ayyasamy, S. [3 ]
机构
[1] Sethu Inst Technol, Dept CSE, Pulloor, Tamil Nadu, India
[2] Jain Univ, Sch Engn & Technol, Dept CSE, JGI Global Campus, Bengaluru, Karnataka, India
[3] Dr NGP Inst Technol, Dept CSE, Coimbatore, Tamil Nadu, India
关键词
Wireless Intrusion Detection System (WIDS); Pattern matching; Finite automata; REGULAR-EXPRESSION; ARCHITECTURE;
D O I
10.1016/j.comcom.2019.11.035
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless Intrusion Detection System (WIDS) has been introduced for providing enhanced security level in WLANs, owing to the numerous and potentially devastating threats against it. WIDS are software- or hardware-based. The hardware-based approaches focus on memory efficiency in pattern matching. This paper proposes a pattern matching algorithm called All-Ready State Traversal pattern matching algorithm. This algorithm constructs the state traversal machine with 1280 bytes size, and enables users to store large sized string patterns in the pattern database. The state traversal machine facilitates the easy retrieval of these patterns through the path vector. Further, the proposed work also follows a number of basic ASCII characters with 128 bytes size; and designs the memory architecture using Binary Search Tree (BST) structure. The hardware generates the addresses of input strings. State traversal machine and bits split algorithms are used to merge together the common addresses of input strings. The merged addresses are encrypted and decrypted by Blowfish algorithm to allow the valid packets and to discard the invalid packets using WIDS. Thus, the proposed algorithm provides a significant reduction in memory usage than that of Aho-Corasick algorithm.
引用
收藏
页码:111 / 118
页数:8
相关论文
共 23 条
[11]   An improved algorithm of pattern matching for information security audit system [J].
School of Physics Science and Information Engineering, Jishou University, Jishou 416000, China ;
不详 ;
不详 .
J. Comput. Inf. Syst., 2008, 5 (2221-2228)
[12]   Pattern Matching Algorithms for Intrusion Detection and Prevention System: A Comparative Analysis [J].
Gupta, Vibha ;
Singh, Maninder ;
Bhalla, Vinod K. .
2014 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2014, :50-54
[13]   Handling Alerts for Intrusion Detection System Using Stateful Pattern Matching [J].
Chakir, El Mostapha ;
Idrissi Khamlichi, Youness ;
Moughit, Mohamed .
2016 4TH IEEE INTERNATIONAL COLLOQUIUM ON INFORMATION SCIENCE AND TECHNOLOGY (CIST), 2016, :139-144
[14]   A survey on Finite Automata Based Pattern Matching Techniques for Network Intrusion Detection System (NIDS) [J].
Rathod, Prashantkumar M. ;
Marathe, Nilesh ;
Vidhate, Amarsinh V. .
2014 INTERNATIONAL CONFERENCE ON ADVANCES IN ELECTRONICS, COMPUTERS AND COMMUNICATIONS (ICAECC), 2014,
[15]   Research on intrusion detection based on Boyer-Moore pattern matching algorithm [J].
Li, Yulong ;
Li, Chenhao ;
Jiao, Yang ;
Zhao, Guogang ;
Liu, Yang ;
Zhang, Tian .
PROCEEDINGS OF 2023 7TH INTERNATIONAL CONFERENCE ON ELECTRONIC INFORMATION TECHNOLOGY AND COMPUTER ENGINEERING, EITCE 2023, 2023, :1490-1494
[16]   Prospective Backward Oracle Matching Algorithm for Network Intrusion Detection System [J].
Gaddam, RaviTeja ;
Nandhini, M. .
2017 2ND IEEE INTERNATIONAL CONFERENCE ON RECENT TRENDS IN ELECTRONICS, INFORMATION & COMMUNICATION TECHNOLOGY (RTEICT), 2017, :1143-+
[17]   GPGPU Based Hybrid Multi-Pattern Algorithm Design for High-Speed Intrusion Detection System [J].
Hasan, Awsan Abdulrahman ;
Rashid, Nur' Aini Abdul ;
Abdulrazzaq, Atheer Akram .
2014 IEEE INTERNATIONAL CONFERENCE ON CONTROL SYSTEM COMPUTING AND ENGINEERING, 2014, :141-146
[18]   An Efficient Multi-hash Pattern Matching Scheme for Intrusion Detection in FPGA-based Reconfiguring Hardware [J].
Kim, Byoungkoo ;
Yoon, Seungyong ;
Oh, Jintae .
PROCEEDINGS OF THE 8TH WSEAS INTERNATIONAL CONFERENCE ON APPLIED COMPUTER SCIENCE (ACS'08): RECENT ADVANCES ON APPLIED COMPUTER SCIENCE, 2008, :199-+
[19]   An Intrusion Detection System Based on Genetic Algorithm for Software-Defined Networks [J].
Zhao, Xuejian ;
Su, Huiying ;
Sun, Zhixin .
MATHEMATICS, 2022, 10 (21)
[20]   Efficient Regular Expression Pattern Matching for Network Intrusion Detection Systems using Modified Word-based Automata [J].
Kumar, Pawan ;
Singh, Virendra .
PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS, 2012, :103-110