High Performance Pattern Matching Algorithm for Network Security

被引:0
作者
Wang, Yang [1 ]
Kobayashi, Hidetsune [1 ]
机构
[1] Nihon Univ, Grad Sch Sci & Technol, Tokyo, Japan
来源
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY | 2006年 / 6卷 / 10期
关键词
pattern matching; Boyer-Moore algorithm; network security; network intrusion detection;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Many network security applications rely on pattern matching to extract the threat from network traffic. The increase in network speed and traffic may make existing algorithms to become a performance bottleneck. Therefore, it is very necessary to develop faster and more efficient pattern matching algorithms in order to overcome the troubles on performance. In this paper, we present a new pattern matching algorithm. The improved algorithm and its working process are described in detail. Together with a new concept of reference point, a two-dimensional array redesigned based on novel generated rules in the pre-processing phase, endorse the algorithm a better performance and more efficient. The algorithm also passed tests and is validated. Our experimental results, the average performance of English text and network traffic can be improved up to 24% similar to 31% compared to Boyer-Moore algorithm.
引用
收藏
页码:83 / 87
页数:5
相关论文
共 50 条
[31]   Hybrid Multithreaded Pattern Matching Algorithm for Intrusion Detections Systems [J].
Aldwairi, Monther ;
Ekailan, Niveen .
JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2011, 6 (06) :512-521
[32]   IDPM: An Improved Degenerate Pattern Matching Algorithm for Biological Sequences [J].
Lin, Jie ;
Jiang, Yue ;
Harner, E. James ;
Jiang, Bing-Hua ;
Adjeroh, Don .
INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2017, 28 (07) :889-914
[33]   FPGA-Based Parallel Pattern Matching Algorithm for Network Intrusion Detection System [J].
Yu, Jing ;
Yang, Bo ;
Sun, Ruiyuan ;
Chen, Zhenxiang .
MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 2, PROCEEDINGS, 2009, :458-461
[34]   A Scalable High-Performance Virus Detection Processor Against a Large Pattern Set for Embedded Network Security [J].
Cheng, Chieh-Jen ;
Wang, Chao-Ching ;
Ku, Wei-Chun ;
Chen, Tien-Fu ;
Wang, Jinn-Shyan .
IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2012, 20 (05) :841-854
[35]   High performance embedded system for real-time pattern matching [J].
Sotiropoulou, C. -L. ;
Luciano, P. ;
Gkaitatzis, S. ;
Citraro, S. ;
Giannetti, P. ;
Dell'Orso, M. .
NUCLEAR INSTRUMENTS & METHODS IN PHYSICS RESEARCH SECTION A-ACCELERATORS SPECTROMETERS DETECTORS AND ASSOCIATED EQUIPMENT, 2017, 845 :628-632
[36]   Distributed Hierarchical Pattern-Matching for Network Intrusion Detection [J].
Baig, Zubair ;
Salah, Khaled .
JOURNAL OF INTERNET TECHNOLOGY, 2016, 17 (02) :167-178
[37]   ANALYZING THE PERFORMANCE DIFFERENCES BETWEEN PATTERN MATCHING AND COMPRESSED PATTERN MATCHING ON TEXTS [J].
Erdogan, Cihat ;
Bulus, H. Nusret ;
Diri, Banu .
2013 INTERNATIONAL CONFERENCE ON ELECTRONICS, COMPUTER AND COMPUTATION (ICECCO), 2013, :135-138
[38]   In-Depth Packet Inspection Using a Hierarchical Pattern Matching Algorithm [J].
Sheu, Tzu-Fang ;
Huang, Nen-Fu ;
Lee, Hsiao-Ping .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2010, 7 (02) :175-188
[39]   A Pattern Matching Method and Algorithm for Face Detection [J].
Vrejoiu, Mihnea Horia .
STUDIES IN INFORMATICS AND CONTROL, 2017, 26 (01) :75-86
[40]   Linear algorithm for conservative degenerate pattern matching [J].
Crochemore, Maxime ;
Iliopoulos, Costas S. ;
Kundu, Ritu ;
Mohamed, Manal ;
Vayani, Fatima .
ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2016, 51 :109-114