An efficient parallel-network packet pattern-matching approach using GPUs

被引:14
作者
Hung, Che-Lun [1 ]
Lin, Chun-Yuan [2 ]
Wang, Hsiao-Hsi [3 ]
机构
[1] Providence Univ, Dept Comp Sci & Commun Engn, Taichung, Taiwan
[2] Chang Gung Univ, Dept Comp Sci & Informat Engn, Taoyuan, Taiwan
[3] Providence Univ, Dept Comp Sci & Informat Management, Taichung, Taiwan
关键词
Graphics processing units; Parallel processing; Pattern matching; Intrusion detection systems; COMPUTATION;
D O I
10.1016/j.sysarc.2014.01.007
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In the past few years, the increase in interest usage has been substantial. The high network bandwidth speed and the large amount of threats pose challenges to current network intrusion detection systems, which manage high amounts of network traffic and perform complicated packet processing. Pattern matching is a computationally intensive process included in network intrusion detection systems. In this paper, we present an efficient graphics processing unit (GPU)-based network packet pattern-matching algorithm by leveraging the computational power of GPUs to accelerate pattern-matching operations and subsequently increase the overall processing throughput. According to the experimental results, the proposed algorithm achieved a maximal traffic processing throughput of over 2 Gbit/s. The results demonstrate that the proposed GPU-based algorithm can effectively enhance the performance of network intrusion detection systems. (C) 2014 Elsevier B.V. All rights reserved.
引用
收藏
页码:431 / 439
页数:9
相关论文
共 24 条
[1]   EFFICIENT STRING MATCHING - AID TO BIBLIOGRAPHIC SEARCH [J].
AHO, AV ;
CORASICK, MJ .
COMMUNICATIONS OF THE ACM, 1975, 18 (06) :333-340
[2]  
[Anonymous], CUD C BEST PRACT GUI
[3]  
[Anonymous], 1994, FAST ALGORITHM MULTI
[4]  
Antonatos S., 2004, Software Engineering Notes, V29, P207, DOI 10.1145/974043.974078
[5]  
Attig M, 2005, ANN IEEE SYM FIELD P, P225
[6]  
Baker Z., 2004, P 2004 ACMSIGDA 12 I, P223
[7]  
Bos H., 2005, RECENT ADV INTRUSION
[8]   FAST STRING SEARCHING ALGORITHM [J].
BOYER, RS ;
MOORE, JS .
COMMUNICATIONS OF THE ACM, 1977, 20 (10) :762-772
[9]   On the statistical distribution of processing times in network intrusion detection [J].
Cabrera, JBD ;
Gosar, J ;
Lee, W ;
Mehra, RK .
2004 43RD IEEE CONFERENCE ON DECISION AND CONTROL (CDC), VOLS 1-5, 2004, :75-80
[10]  
Coit CJ, 2001, DISCEX'01: DARPA INFORMATION SURVIVABILITY CONFERENCE & EXPOSITION II, VOL I, PROCEEDINGS, P367, DOI 10.1109/DISCEX.2001.932231