An Efficient Pattern Matching Algorithm for Intrusion Detection Systems

被引:1
|
作者
Anithakumari, S. [1 ]
Chithraprasad, D. [2 ]
机构
[1] LBSITW, Dept Comp Sci & Engg, Thiruvananthapuram, Kerala, India
[2] TKM Coll Egg, Dept Comp Engn & Sci, Kollam, Kerala, India
关键词
intrusion detection; pattern matching; Snort; rule database; Boyer-Moore; Aho-Corasick; Dawg structure;
D O I
10.1109/IADCC.2009.4809011
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Intrusion detection systems are treated as vital elements of protective measures to computer systems, and networks from abuse. The drastic increase in network speed and detection workloads necessitates the need for highly efficient Network Intrusion Detection Systems(NIDS). Since most NIDSs need to check for a large number of known attack patterns in every packet, pattern matching becomes the most significant part of signature-based NIDSs in terms of processing and memory resources. To support segmentation of network traffic and to detect fragmented attacks, we propose a method which performs both 'partial' and 'full' pattern matching using the data structure CDAWG (Compact Direct Acyclic Word Graph). In the present work, we designed and implemented an efficient string matching algorithm using CDAWG structure. Experimental results show that this algorithm is 2.5 times faster than the currently used Aho-Corasick algorithm.
引用
下载
收藏
页码:223 / +
页数:3
相关论文
共 50 条
  • [31] Efficient Packet Pattern Matching for Gigabit Network Intrusion Detection using GPUs
    Hung, Che-Lun
    Wang, Hsiao-hsi
    Chang, Chin-Yuan
    Lin, Chun-Yuan
    2012 IEEE 14TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS & 2012 IEEE 9TH INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS (HPCC-ICESS), 2012, : 1612 - 1617
  • [32] Real-Time Intrusion Detection with Genetic, Fuzzy, Pattern Matching Algorithm
    Kadam, Priya Uttam
    Deshmukh, Manjusha
    PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT, 2016, : 753 - 758
  • [33] Research on intrusion detection based on Boyer-Moore pattern matching algorithm
    Li, Yulong
    Li, Chenhao
    Jiao, Yang
    Zhao, Guogang
    Liu, Yang
    Zhang, Tian
    PROCEEDINGS OF 2023 7TH INTERNATIONAL CONFERENCE ON ELECTRONIC INFORMATION TECHNOLOGY AND COMPUTER ENGINEERING, EITCE 2023, 2023, : 1490 - 1494
  • [34] An efficient pattern matching algorithm
    Sleit, Azzam
    AlMobaideen, Wesam
    Baarah, Aladdin H.
    Abusitta, Adel H.
    Journal of Applied Sciences, 2007, 7 (18) : 2691 - 2695
  • [35] A Memory-Efficient Parallel String Matching for Intrusion Detection Systems
    Kim, HyunJin
    Hong, Hyejeong
    Kim, Hong-Sik
    Kang, Sungho
    IEEE COMMUNICATIONS LETTERS, 2009, 13 (12) : 1004 - 1006
  • [36] A fast determinate string matching algorithm for the network intrusion detection systems
    Zhong, Cheng
    Chen, Guo-Liang
    PROCEEDINGS OF 2007 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2007, : 3173 - 3177
  • [37] Parallel Scalable Approximate Matching Algorithm for Network Intrusion Detection Systems
    Hnaif, Adnan
    Jaber, Khalid
    Alia, Mohammad
    Daghbosheh, Mohammed
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2021, 18 (01) : 77 - 84
  • [38] On the fly pattern matching for intrusion detection with Snort
    Abbes, T
    Bouhoula, A
    Rusinowitch, M
    ANNALS OF TELECOMMUNICATIONS, 2004, 59 (9-10) : 1045 - 1071
  • [39] Robust and Fast Pattern Matching for Intrusion Detection
    Namjoshi, Kedar
    Narlikar, Girija
    2010 PROCEEDINGS IEEE INFOCOM, 2010,
  • [40] Hybrid pattern matching for trusted intrusion detection
    Soewito, Benfano
    Vespa, Lucas
    Weng, Ning
    Wang, Haibo
    SECURITY AND COMMUNICATION NETWORKS, 2011, 4 (01) : 33 - 43