A survey on Finite Automata Based Pattern Matching Techniques for Network Intrusion Detection System (NIDS)

被引:0
作者
Rathod, Prashantkumar M. [1 ]
Marathe, Nilesh [1 ]
Vidhate, Amarsinh V. [1 ]
机构
[1] Ramrao Adik Inst Technol, Dept Comp Engn, Nerul, Navi Mumbai, India
来源
2014 INTERNATIONAL CONFERENCE ON ADVANCES IN ELECTRONICS, COMPUTERS AND COMMUNICATIONS (ICAECC) | 2014年
关键词
Finite Automata; Regular Expression Matching; NIDS and DLPS;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Many network security applications such as Intrusion Detection System (IDS), Firewall and Data Loss Prevention System (DLPS) are based on deep packet inspection, in this packets header as well as payload of the packets are checked with predefined attack signature to identify whether it contains malicious traffic or not. To perform this checking different pattern matching methods are used by NIDS. The most popular method to implement pattern matching is to use of Finite Automata (FA). Generally, regular expressions are used to represent most of the attack signatures defined by NIDS. They are implemented using finite automata, which takes the payload of packet as input string. However, existing approaches of Finite Automata (FA), both deterministic finite automata (DFA) and non-deterministic finite automata (NFA) for pattern matching are having their own advantages and some drawbacks. The DFA based pattern matching methods are fast enough but require more memory. However, NFA based pattern matching methods are comparatively takes less memory but the speed of matching is very slow, to overcome these drawbacks of finite automata there are many approaches have been proposed. This paper discuses comparative study of some Finite Automata (FA) based techniques for pattern matching in network intrusion detection system (NIDS).
引用
收藏
页数:5
相关论文
共 10 条
[1]  
BECCHI M, 2007, P IEEE INF 2007 MAY
[2]  
Devi T. Aswini, 2013, INT J COMPUTATIONAL
[3]  
Jiang Junchen, 2010, IEEE ICC 2010 P
[4]  
Lenka Rakesh Kumar, 2012, 3 INT C COMP COMM TE
[5]  
Peng Kunyang, 2011, 7 ACM IEEE S ARCH NE, P24
[6]  
Sun Yan, IEEE ICC 2011 P
[7]   REGULAR EXPRESSION SEARCH ALGORITHM [J].
THOMPSON, K .
COMMUNICATIONS OF THE ACM, 1968, 11 (06) :419-&
[8]  
Wang Xiaofei, 2013, IEEE SYSTEMS J, V7
[9]  
Yang Liu, P RAID 10 P 13 INT C, P58
[10]  
Zhang Jiekun, 2009, 15 IEEE PAC RIM INT