Efficient pattern matching algorithm for security and Binary Search Tree (BST) based memory system in Wireless Intrusion Detection System (WIDS)

被引:7
作者
Suresh, P. [1 ]
Sukumar, R. [2 ]
Ayyasamy, S. [3 ]
机构
[1] Sethu Inst Technol, Dept CSE, Pulloor, Tamil Nadu, India
[2] Jain Univ, Sch Engn & Technol, Dept CSE, JGI Global Campus, Bengaluru, Karnataka, India
[3] Dr NGP Inst Technol, Dept CSE, Coimbatore, Tamil Nadu, India
关键词
Wireless Intrusion Detection System (WIDS); Pattern matching; Finite automata; REGULAR-EXPRESSION; ARCHITECTURE;
D O I
10.1016/j.comcom.2019.11.035
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless Intrusion Detection System (WIDS) has been introduced for providing enhanced security level in WLANs, owing to the numerous and potentially devastating threats against it. WIDS are software- or hardware-based. The hardware-based approaches focus on memory efficiency in pattern matching. This paper proposes a pattern matching algorithm called All-Ready State Traversal pattern matching algorithm. This algorithm constructs the state traversal machine with 1280 bytes size, and enables users to store large sized string patterns in the pattern database. The state traversal machine facilitates the easy retrieval of these patterns through the path vector. Further, the proposed work also follows a number of basic ASCII characters with 128 bytes size; and designs the memory architecture using Binary Search Tree (BST) structure. The hardware generates the addresses of input strings. State traversal machine and bits split algorithms are used to merge together the common addresses of input strings. The merged addresses are encrypted and decrypted by Blowfish algorithm to allow the valid packets and to discard the invalid packets using WIDS. Thus, the proposed algorithm provides a significant reduction in memory usage than that of Aho-Corasick algorithm.
引用
收藏
页码:111 / 118
页数:8
相关论文
共 23 条
  • [11] An improved algorithm of pattern matching for information security audit system
    School of Physics Science and Information Engineering, Jishou University, Jishou 416000, China
    不详
    不详
    J. Comput. Inf. Syst., 2008, 5 (2221-2228):
  • [12] Handling Alerts for Intrusion Detection System Using Stateful Pattern Matching
    Chakir, El Mostapha
    Idrissi Khamlichi, Youness
    Moughit, Mohamed
    2016 4TH IEEE INTERNATIONAL COLLOQUIUM ON INFORMATION SCIENCE AND TECHNOLOGY (CIST), 2016, : 139 - 144
  • [13] Pattern Matching Algorithms for Intrusion Detection and Prevention System: A Comparative Analysis
    Gupta, Vibha
    Singh, Maninder
    Bhalla, Vinod K.
    2014 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2014, : 50 - 54
  • [14] A survey on Finite Automata Based Pattern Matching Techniques for Network Intrusion Detection System (NIDS)
    Rathod, Prashantkumar M.
    Marathe, Nilesh
    Vidhate, Amarsinh V.
    2014 INTERNATIONAL CONFERENCE ON ADVANCES IN ELECTRONICS, COMPUTERS AND COMMUNICATIONS (ICAECC), 2014,
  • [15] Research on intrusion detection based on Boyer-Moore pattern matching algorithm
    Li, Yulong
    Li, Chenhao
    Jiao, Yang
    Zhao, Guogang
    Liu, Yang
    Zhang, Tian
    PROCEEDINGS OF 2023 7TH INTERNATIONAL CONFERENCE ON ELECTRONIC INFORMATION TECHNOLOGY AND COMPUTER ENGINEERING, EITCE 2023, 2023, : 1490 - 1494
  • [16] Prospective Backward Oracle Matching Algorithm for Network Intrusion Detection System
    Gaddam, RaviTeja
    Nandhini, M.
    2017 2ND IEEE INTERNATIONAL CONFERENCE ON RECENT TRENDS IN ELECTRONICS, INFORMATION & COMMUNICATION TECHNOLOGY (RTEICT), 2017, : 1143 - +
  • [17] GPGPU Based Hybrid Multi-Pattern Algorithm Design for High-Speed Intrusion Detection System
    Hasan, Awsan Abdulrahman
    Rashid, Nur' Aini Abdul
    Abdulrazzaq, Atheer Akram
    2014 IEEE INTERNATIONAL CONFERENCE ON CONTROL SYSTEM COMPUTING AND ENGINEERING, 2014, : 141 - 146
  • [18] An Efficient Multi-hash Pattern Matching Scheme for Intrusion Detection in FPGA-based Reconfiguring Hardware
    Kim, Byoungkoo
    Yoon, Seungyong
    Oh, Jintae
    PROCEEDINGS OF THE 8TH WSEAS INTERNATIONAL CONFERENCE ON APPLIED COMPUTER SCIENCE (ACS'08): RECENT ADVANCES ON APPLIED COMPUTER SCIENCE, 2008, : 199 - +
  • [19] An Intrusion Detection System Based on Genetic Algorithm for Software-Defined Networks
    Zhao, Xuejian
    Su, Huiying
    Sun, Zhixin
    MATHEMATICS, 2022, 10 (21)
  • [20] Efficient Regular Expression Pattern Matching for Network Intrusion Detection Systems using Modified Word-based Automata
    Kumar, Pawan
    Singh, Virendra
    PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS, 2012, : 103 - 110