期刊文献+

面向深度分组检测的高速数据分组解析结构 被引量:1

Deep packet inspection oriented high speed packet parsing architecture
在线阅读 下载PDF
导出
摘要 提出了一种面向深度分组检测的高速数据分组解析结构BiPPCS(bidirectional packet parsing architecturefor content security)。结构采用内容萃取树描述协议的耦合关系从而提高了数据分组解析的灵活性;利用硬件双向并行流水线提升了数据分组解析的处理速率;通过使用节点映射算法来均衡各级流水线上的节点数目优化存储空间;分析和仿真显示BiPPCS在处理速率、空间利用率等方面能取得较好的均衡。 A deep packet inspection oriented high speed packet parsing architecture called BiPPCS (bidirectional packet parsing architecture for content security) was proposed. Firstly, the content extraction tree was used to describe the cou- pling of the protocol relationship to improve flexibility of the packet parsing. Secondly, hardware bi-directional parallel pipeline was used to enhance the processing rate of the packet parsing. Thirdly, a node mapping algorithm was used to balance the number of nodes on all pipeline stages to optimize the storage space. Analysis and simulation show that BiPPCS gets balance among the rate processing, resource consumption and other aspects.
出处 《通信学报》 EI CSCD 北大核心 2013年第6期156-164,共9页 Journal on Communications
基金 国家重点基础研究发展计划("973"计划)基金资助项目(2012CB315901) 国家高技术研究发展计划("863"计划)基金资助项目(2011AA01A103) 国家科技支撑计划基金资助项目(2011BAH19B01)~~
关键词 数据分组解析 深度分组检测 二叉trie树 网络安全 可重构 NETFPGA packet parsing deep packet inspection binary trie network security reconfiguration NetFPGA
  • 相关文献

参考文献2

二级参考文献28

  • 1徐明,陈纯,应晶.一个两层马尔可夫链异常入侵检测模型(英文)[J].软件学报,2005,16(2):276-285. 被引量:7
  • 2WHITMA N, MMICHAE L, MATTORD H. Principles of Information Security[M]. Canada: Thomson, 2009. 290 -301.
  • 3JAN N Y, LIN S C, TSENT S S, et al. A decision support system for onstructing an alert classification model[J]. Journals of Expert Systems with Applications, 2009, 36(8): 11145-11155.
  • 4LINDQIVST U, PORRAS P A. Detecting Computer and Network Misuse Through the Production-Based Expert System Toolset (P-BEST)[R]. IEEE Symposium on Security and Privacy, Oakland, 1999. 146-161.
  • 5JOAO B D, RAVICHANDRAN B. Statistical traffic modeling for network intrusion detection[A]. Eighth IEEE International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunications Systems (MASCOTS'00)[C]. San Francisco, 2000.
  • 6WUU L C, HUNG C H, CHEN S F. Building intrusion pattern miner for Snort network intrusion detection system[J]. Journal of Systems and Software, 2007,80(10):1699-1715.
  • 7NEIMNBE J O. Automated technique for debugging network intrusion detection systems[A]. IEEE 2010 International Conference on Intelligent Systems, Modelling and Simulation (ISMS)[C]. Liverpool, 2010. 362-367.
  • 8CUPPENS F, MIEGE A. Alert correlation in a cooperative intrusion detection framework[A]. Proceedings of IEEE Symposium on Security and Privacy[C]. Berkeley, 2002.
  • 9NEHINBE J O. A simple method for improving intrusion detections in corporate networks[A]. International Conference on Information Security and Digital Forensics[C]. London, 2009.
  • 10DHARMAPURIKAR S, LOCKWOOD J W. Fast and scalable pattern matching for network intrusion detection systems[J]. IEEE Journal on Selected Areas in Communications, 2006,24(10): 1781-1792.

共引文献17

同被引文献14

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部