Hardware acceleration of regular expression repetitions in deep packet inspection

被引:4
|
作者
Cronin, Brendan [1 ]
Wang, Xiaojun [1 ]
机构
[1] Dublin City Univ, RINCE Inst, Sch Elect Engn, Dublin 9, Ireland
关键词
digital signatures; finite automata; symbol manipulation; computer network security; hardware acceleration; regular expression repetitions; deep packet inspection; network intrusion detection systems; NIDS; attack signatures; bit-parallel architecture; Glushkov nondeterministic flnite automata; NFA; constrained repetitions; multisymbol subexpressions; NIDS rule sets; standard BP system;
D O I
10.1049/iet-ifs.2012.0340
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Network Intrusion Detection Systems (NIDS) make extensive use of regular expressions (regexes) as attack signatures. Such expressions can be handled in hardware using a bit-parallel (BP) architecture based on the Glushkov non-deterministic finite automata (NFA). However, many expressions contain constrained {min, max} repetitions which first need to be unrolled so that they can be handled by the standard BP system. Such unrolling often leads to an excessive memory requirement which makes handling of such regexes unfeasible. This study presents a solution, based on the standard BP architecture, which incorporates a counting mechanism that renders unrolling unnecessary. As a result, many regexes, which were previously unsuitable for the standard BP system, can now be efficiently handled. Unlike many other approaches, this architecture is dynamically reconfigurable thanks to its memory, rather than logic, based engine. This is important as NIDS rule sets are regularly updated. It can also handle repetition of both single and multi-symbol sub-expressions.
引用
收藏
页码:327 / 335
页数:9
相关论文
共 50 条
  • [41] OPTIMIZED IMPLEMENTATION OF A FAST WAVELET PACKET TRANSFORM ARCHITECTURE WITH HARDWARE ACCELERATION
    Ghozatloo, Hamid Reza
    Noori, Mohammad
    [J]. ISPRA '09: PROCEEDINGS OF THE 9TH WSEAS INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, ROBOTICS AND AUTOMATION, 2010, : 27 - +
  • [42] Deep packet inspection using parallel bloom filters
    Dharmapurikar, S
    Krishnamurthy, P
    Sproull, TS
    Lockwood, JW
    [J]. IEEE MICRO, 2004, 24 (01) : 52 - 61
  • [43] Improved deep packet inspection in data stream detection
    Yin, Chunyong
    Wang, Hongyi
    Yin, Xiang
    Sun, Ruxia
    Wang, Jin
    [J]. JOURNAL OF SUPERCOMPUTING, 2019, 75 (08): : 4295 - 4308
  • [44] Performance Improvement of Deep Packet Inspection for Intrusion Detection
    Parvat, Thaksen J.
    Chandra, Pravin
    [J]. 2014 IEEE GLOBAL CONFERENCE ON WIRELESS COMPUTING AND NETWORKING (GCWCN), 2014, : 224 - 228
  • [45] Using Deep Packet Inspection in Cyber Traffic Analysis
    Deri, Luca
    Fusco, Francesco
    [J]. PROCEEDINGS OF THE 2021 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE (IEEE CSR), 2021, : 89 - 94
  • [46] The Tale of Deep Packet Inspection in China: Mind the Gap
    Yang, Feng
    [J]. 2015 3rd International Conference on Information and Communication Technology (ICoICT), 2015, : 348 - 351
  • [47] Improved deep packet inspection in data stream detection
    Chunyong Yin
    Hongyi Wang
    Xiang Yin
    Ruxia Sun
    Jin Wang
    [J]. The Journal of Supercomputing, 2019, 75 : 4295 - 4308
  • [48] A Novel Approach to Deep Packet Inspection for Intrusion Detection
    Parvat, Thaksen J.
    Chandra, Pravin
    [J]. INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING TECHNOLOGIES AND APPLICATIONS (ICACTA), 2015, 45 : 506 - 513
  • [49] An Approach for Unifying Rule Based Deep Packet Inspection
    Munoz, A.
    Sezer, S.
    Burns, D.
    Douglas, G.
    [J]. 2011 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2011,
  • [50] Fast dynamic pattern matching for deep packet inspection
    Xu Kefu
    Qi Deyu
    Qian Zhengping
    Zheng Weiping
    [J]. PROCEEDINGS OF 2008 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL, VOLS 1 AND 2, 2008, : 802 - 807