Memory-Efficient String Matching for Intrusion Detection Systems using a High-Precision Pattern Grouping Algorithm

被引:6
|
作者
Vakili, Shervin [1 ]
Langlois, J. M. Pierre [1 ]
Boughzala, Bochra [2 ]
Savaria, Yvon [1 ]
机构
[1] Polytech Montreal, Montreal, PQ, Canada
[2] Ericsson Canada, Montreal, PQ, Canada
关键词
Computer network security; Deep packet inspection; Intrusion detection systems; String matching;
D O I
10.1145/2881025.2881031
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The increasing complexity of cyber-attacks necessitates the design of more efficient hardware architectures for real-time Intrusion Detection Systems (IDSs). String matching is the main performance-demanding component of an IDS. An effective technique to design high-performance string matching engines is to partition the target set of strings into multiple subgroups and to use a parallel string matching hardware unit for each subgroup. This paper introduces a novel pattern grouping algorithm for heterogeneous bit-split string matching architectures. The proposed algorithm presents a reliable method to estimate the correlation between strings. The correlation factors are then used to find a preferred group for each string in a seed growing approach. Experimental results demonstrate that the proposed algorithm achieves an average of 41% reduction in memory consumption compared to the best existing approach found in the literature, while offering orders of magnitude faster execution time compared to an exhaustive search.
引用
收藏
页码:37 / 42
页数:6
相关论文
共 50 条
  • [21] A fast determinate string matching algorithm for the network intrusion detection systems
    Zhong, Cheng
    Chen, Guo-Liang
    [J]. PROCEEDINGS OF 2007 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2007, : 3173 - 3177
  • [22] An Efficient String Matching Algorithm Using Bidirectional and Parallel Processing Structure for Intrusion Detection System
    Chang, Gwo-Ching
    Lin, Yue-Der
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2010, 4 (05): : 956 - 967
  • [23] An iterative pattern mapping for parallel string matching architecture in intrusion detection systems
    Kim, HyunJin
    [J]. IEICE ELECTRONICS EXPRESS, 2012, 9 (11): : 985 - 989
  • [24] EFFICIENT MULTIPLE PATTERN MATCHING ALGORITHMS FOR NETWORK INTRUSION DETECTION SYSTEMS
    Lee, Sunho
    Kim, Dong Kyue
    [J]. 2009 IEEE INTERNATIONAL CONFERENCE ON NETWORK INFRASTRUCTURE AND DIGITAL CONTENT, PROCEEDINGS, 2009, : 609 - 613
  • [25] A memory-efficient reconfigurable Aho-Corasick FSM implementation for intrusion detection systems
    Dimopoulos, Vassilis
    Papaefstathiou, Ioannis
    Pnevmatikatos, Dionisios
    [J]. IC-SAMOS: 2007 INTERNATIONAL CONFERENCE ON EMBEDDED COMPUTER SYSTEMS: ARCHITECTURES, MODELING AND SIMULATION, PROCEEDINGS, 2007, : 186 - +
  • [26] Memory-Efficient Pattern Matching Architectures Using Perfect Hashing on Graphic Processing Units
    Lin, Cheng-Hung
    Liu, Chen-Hsiung
    Chang, Shih-Chieh
    Hon, Wing-Kai
    [J]. 2012 PROCEEDINGS IEEE INFOCOM, 2012, : 1978 - 1986
  • [27] A Memory-Efficient Pattern Matching with Hardware-Based Bit-Split String Matchers for Deep Packet Inspection
    Kim, Hyunjin
    Kim, Hong-Sik
    Lee, Jung-Hee
    Ahn, Jin-Ho
    Kang, Sungho
    [J]. IEICE TRANSACTIONS ON COMMUNICATIONS, 2010, E93B (02) : 396 - 398
  • [28] Efficient Packet Pattern Matching for Gigabit Network Intrusion Detection using GPUs
    Hung, Che-Lun
    Wang, Hsiao-hsi
    Chang, Chin-Yuan
    Lin, Chun-Yuan
    [J]. 2012 IEEE 14TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS & 2012 IEEE 9TH INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS (HPCC-ICESS), 2012, : 1612 - 1617
  • [29] A parallel "String Matching Engine" for use in high speed network intrusion detection systems
    Tripp, Gerald
    [J]. JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2006, 2 (01): : 21 - 34
  • [30] A Parallel “String Matching Engine” for use in High Speed Network Intrusion Detection Systems
    Gerald Tripp
    [J]. Journal in Computer Virology, 2006, 2 (1): : 21 - 34