Two-phase Pattern Matching for Regular Expressions in Intrusion Detection Systems

被引:0
|
作者
Yang, Chang-Ching [1 ]
Cheng, Chen-Mou [1 ]
Wang, Sheng-De [1 ]
机构
[1] Natl Taiwan Univ, Dept Elect Engn, Taipei 106, Taiwan
关键词
network intrusion detection; pattern matching; regular expressions; deterministic finite-state automata; two-phase matching engine;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Regular expressions are used to describe security threats' signatures in network intrusion detection (NID) systems. To identify suspicious packets using regular expression matching, many NID systems use memory-based deterministic finite-state automata (DFA) with one-pass-scanning model, which is fast and allows dynamic updates. However, a number of practical signature patterns commonly found in a variety of NID systems, e.g.,". (star)A. {N} B", can cause a state-explosion problem in such a model. In this paper, we propose a two-phase pattern matching engine (TPME) to solve this problem. In our proposed approach, the state storage cost is reduced to linearly dependent on the number of repetitions N in the patterns. With the new approach, we are now able to handle those practical patterns that would have caused the state-explosion problem in memory-based DFA. We report our implementation of TPME on a field programmable gate array (FPGA). With our prototype implementation, we can achieve a throughput of more than 1.86 gigabits per second for pattern matching in a practical NID system.
引用
收藏
页码:1563 / 1582
页数:20
相关论文
共 47 条
  • [41] Attack Signature Matching using Graphics Processors in High-Performance Intrusion Detection Systems
    Mahdinia, Payam
    Berenjkoob, Mehdi
    Vatankhah, Hedayat
    2013 21ST IRANIAN CONFERENCE ON ELECTRICAL ENGINEERING (ICEE), 2013,
  • [42] Real-Time Hybrid Compression of Pattern Matching Automata for Heterogeneous Signature-Based Intrusion Detection
    Pungila, Ciprian
    Negru, Viorel
    INTERNATIONAL JOINT CONFERENCE: CISIS'15 AND ICEUTE'15, 2015, 369 : 65 - 74
  • [43] A Synergetic Pattern Matching Method Based-on DHT Structure for Intrusion Detection in Large-scale Network
    Ma, Dong
    Wang, Yongjun
    Fu, Zhenlong
    CEIS 2011, 2011, 15
  • [44] An Efficient Multi-hash Pattern Matching Scheme for Intrusion Detection in FPGA-based Reconfiguring Hardware
    Kim, Byoungkoo
    Yoon, Seungyong
    Oh, Jintae
    PROCEEDINGS OF THE 8TH WSEAS INTERNATIONAL CONFERENCE ON APPLIED COMPUTER SCIENCE (ACS'08): RECENT ADVANCES ON APPLIED COMPUTER SCIENCE, 2008, : 199 - +
  • [45] Deep learning-based feature extraction and optimizing pattern matching for intrusion detection using finite state machine
    Abbasi, Junaid Shabbir
    Bashir, Faisal
    Qureshi, Kashif Naseer
    ul Islam, Muhammad Najam
    Jeon, Gwanggil
    COMPUTERS & ELECTRICAL ENGINEERING, 2021, 92
  • [46] Efficient approach to early detection of lithographic hotspots using machine learning systems and pattern matching
    Wuu, Jen-Yi
    Pikus, Fedor G.
    Marek-Sadowska, Malgorzata
    DESIGN FOR MANUFACTURABILITY THROUGH DESIGN-PROCESS INTEGRATION V, 2011, 7974
  • [47] Efficient pattern matching algorithm for security and Binary Search Tree (BST) based memory system in Wireless Intrusion Detection System (WIDS)
    Suresh, P.
    Sukumar, R.
    Ayyasamy, S.
    COMPUTER COMMUNICATIONS, 2020, 151 : 111 - 118