期刊文献+

基于确定有限状态自动机的改进多模式匹配算法研究 被引量:10

RESEARCH ON IMPROVING MULTI-PATTERN MATCHING ALGORITHM BASED ON DETERMINISTIC FINITE-STATE AUTOMATON
在线阅读 下载PDF
导出
摘要 针对网络入侵检测系统的一般问题,在详细分析现存单模式与多模式匹配算法的基础上,将AC算法里的DFSA方法与单模式匹配算法BMH的思想相融合,以求取优化检测效率为目标,提出一种基于确定有限状态自动机的改进多模式匹配算法。该算法特别适合在大字符集文本串中查找小字符集模式串。将该改进多模式匹配算法应用到Snort入侵检测过程中,针对处理结果进行科学评价。通过实例的应用,验证了该改进算法的可行性和高效性。 Aiming at the general problems of network intrusion detection system, we make the thorough analysis on existing single pattern and multi-patteru matching algorithms. On this basis, we integrate the DFSA method in AC algorithm with the idea of BMH in single pattern matching algorithm, and take it as the goal that to seek the optimised detection efficiency, we present an improved multi-pattern matching algorithm which is based on deterministic finite-state automaton. This algorithm is particularly suitable for finding the small character sets pattern string in large character set text string. We apply this improved multi-pattern matching algorithm in Snort network intrusion detection process, and make scientific evaluation on the treatment results. Through applying it in practical example, the feasibility and efficiency of the improved algorithm is verified.
作者 陆琳琳 田野
出处 《计算机应用与软件》 CSCD 北大核心 2013年第7期321-323,330,共4页 Computer Applications and Software
关键词 网络入侵检测系统 模式匹配 单模式 确定有限状态自动机 优化策略 Network intrusion detection system Pattern matching Single pattern Deterministic finite-state automaton Optimised strategy
  • 相关文献

参考文献6

二级参考文献28

  • 1宋华,戴一奇.一种用于内容过滤和检测的快速多关键词识别算法[J].计算机研究与发展,2004,41(6):940-945. 被引量:22
  • 2庞善臣,王淑栋,蒋昌俊.BM串匹配的一个改进算法[J].计算机应用,2004,24(12):11-13. 被引量:4
  • 3谷晓钢,江荣安,赵铭伟.Snort的高效规则匹配算法[J].计算机工程,2006,32(18):155-156. 被引量:17
  • 4Knuth D E, Morris J H, Pratt V R. Fast Pattem Matching Instrings[J]. SIAM Journal on Computing, 1997,6 (1) : 323-350.
  • 5Jason C C, Staniford S, McAlemey J. Towards Faster String for Intrusion Detection or Exceeding the Speed of Snort [ EB/OL ]. http://www. silieondefense, com/sotfware/acbm/speed-of-snortpadf, 2001-03-16.
  • 6Denning Dorothy E. Anlntrusion Detection Model [J]. IEEE Transaction on Software Engineering, 1999 (11) :222-225.
  • 7Namjoshi K,Narlikar G.Robust and Fast Pattern Matching forIntrusion Detection[C]∥IEEE Conference on Computer Com-munications.Piscataway,2010:14-19.
  • 8Guinde N B,Ziavras S G.Efficient hardware support for patternmatching in network intrusion detection[J].Computers and Se-curity,2010,29(7):756-769.
  • 9Kim H J,Hong H,Kim H-S,et al.A Memory-Efficient ParallelString Matching for Intrusion Detection Systems[J].IEEECommunications Letters,2009,13(12):1004-1006.
  • 10YANG Dong-hong,XU Ke.An improved Wu-Manber multiplepatterns matching algorithm[C]//The 25th IEEE InternationalPerformance,Computing,and Communications Conference.Phoenix,USA,2006:675-680.

共引文献14

同被引文献61

引证文献10

二级引证文献27

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部