Research of pattern matching in intrusion detection

被引:1
|
作者
Huang, JC [1 ]
Tian, JF [1 ]
Du, RZ [1 ]
Zhai, JQ [1 ]
机构
[1] Hebei Univ, Fac Math & Comp Sci, Baoding 071002, Hebei, Peoples R China
关键词
intrusion detection; pattern matching; trinary tree; automaton;
D O I
10.1109/ICMLC.2003.1259803
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper studies the method of pattern matching in intrusion detection, analyzes the fault and lack of the current methods and proposes a trinary-tree-based automaton method, which avoids some lacks resulting from the changing of the node amount in traditional tree structure. In addition, during matching this method jumps some letters with unsuccessful information, so it obtains higher speed.
引用
收藏
页码:1877 / 1882
页数:6
相关论文
共 50 条
  • [31] An improved multi-pattern matching algorithms in intrusion detection
    Cheng Ke-qin
    Deng Lin
    Wang Hui
    2013 FIFTH INTERNATIONAL CONFERENCE ON MEASURING TECHNOLOGY AND MECHATRONICS AUTOMATION (ICMTMA 2013), 2013, : 203 - 205
  • [32] High-performance pattern-matching for intrusion detection
    van Lunteren, Jan
    25TH IEEE INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-7, PROCEEDINGS IEEE INFOCOM 2006, 2006, : 1409 - 1421
  • [33] ANALYSIS OF PATTERN MATCHING ALGORITHMS IN NETWORK INTRUSION DETECTION SYSTEMS
    Dagar, Vishwajeet
    Prakash, Vatsal
    Bhatia, Tarunpreet
    2016 2ND INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATION, & AUTOMATION (ICACCA) (FALL), 2016, : 169 - 173
  • [34] GPU Application on Multi-Pattern Matching of Network Intrusion Detection
    Lin, Chun-Hung Richard
    Huang, Yu-Hsiu
    Lin, Cheng-Yi
    Lin, Ying-Chih
    JOURNAL OF INTERNET TECHNOLOGY, 2013, 14 (07): : 1033 - 1041
  • [35] Improvement on intrusion detection technology based on protocol analysis and pattern matching
    Hu L.
    Tang K.
    Ku Y.
    Zhao K.
    Journal of Convergence Information Technology, 2010, 5 (03) : 86 - 94
  • [36] Piranha: Fast and memory-efficient pattern matching for intrusion detection
    Antonatos, S
    Polychronakis, M
    Akritidis, P
    Anagnostakis, KG
    Markatos, EP
    SECURITY AND PRIVACY IN THE AGE OF UBIQUITOUS COMPUTING, 2005, 181 : 393 - 408
  • [37] Shift-or circuit for efficient network intrusion detection pattern matching
    Roan, Huang-Chun
    Hwang, Wen-Jyi
    Lo, Chia-Tien Dan
    2006 INTERNATIONAL CONFERENCE ON FIELD PROGRAMMABLE LOGIC AND APPLICATIONS, PROCEEDINGS, 2006, : 785 - 790
  • [38] EFFICIENT MULTIPLE PATTERN MATCHING ALGORITHMS FOR NETWORK INTRUSION DETECTION SYSTEMS
    Lee, Sunho
    Kim, Dong Kyue
    2009 IEEE INTERNATIONAL CONFERENCE ON NETWORK INFRASTRUCTURE AND DIGITAL CONTENT, PROCEEDINGS, 2009, : 609 - 613
  • [39] Variable Length Pattern Matching for Hardware Network Intrusion Detection System
    Xue, Chun Jason
    Liu, Meilin
    Zhuge, QingFeng
    Sha, Edwin Hsing-Mean
    JOURNAL OF SIGNAL PROCESSING SYSTEMS FOR SIGNAL IMAGE AND VIDEO TECHNOLOGY, 2010, 59 (01): : 85 - 93
  • [40] Pattern Matching Algorithms for Intrusion Detection and Prevention System: A Comparative Analysis
    Gupta, Vibha
    Singh, Maninder
    Bhalla, Vinod K.
    2014 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2014, : 50 - 54