Efficient multiple pattern matching algorithms for network intrusion detection systems
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Lee, Sunho | - |
dc.contributor.author | Kim, Dong Kyue | - |
dc.date.accessioned | 2022-12-20T20:10:09Z | - |
dc.date.available | 2022-12-20T20:10:09Z | - |
dc.date.created | 2022-09-16 | - |
dc.date.issued | 2009-11 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/hanyang/handle/2021.sw.hanyang/175877 | - |
dc.description.abstract | Multiple pattern matching algorithms are essential engines of Network Intrusion Detection Systems (NIDSs) to inspect packets for occurrences of malicious patterns. For a set of patterns, the multiple pattern matching algorithms usually build a trie data structure. In this paper, we propose efficient implementations of the multiple pattern matching algorithms widely used in NIDSs by using a linearized compact trie. This linearized compact trie is an array representation of a compact trie and guarantees a size linear to the number of patterns with little loss of lookup time. Thus, our implementations achieve compact sizes with fast time, so it is useful to hardware embedding and cache exploiting. | - |
dc.language | 영어 | - |
dc.language.iso | en | - |
dc.publisher | IEEE | - |
dc.title | Efficient multiple pattern matching algorithms for network intrusion detection systems | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Kim, Dong Kyue | - |
dc.identifier.doi | 10.1109/ICNIDC.2009.5360944 | - |
dc.identifier.scopusid | 2-s2.0-77649330639 | - |
dc.identifier.bibliographicCitation | Proceedings of 2009 IEEE International Conference on Network Infrastructure and Digital Content, IEEE IC-NIDC2009, pp.609 - 613 | - |
dc.relation.isPartOf | Proceedings of 2009 IEEE International Conference on Network Infrastructure and Digital Content, IEEE IC-NIDC2009 | - |
dc.citation.title | Proceedings of 2009 IEEE International Conference on Network Infrastructure and Digital Content, IEEE IC-NIDC2009 | - |
dc.citation.startPage | 609 | - |
dc.citation.endPage | 613 | - |
dc.type.rims | ART | - |
dc.type.docType | Conference Paper | - |
dc.description.journalClass | 1 | - |
dc.description.isOpenAccess | N | - |
dc.description.journalRegisteredClass | scopus | - |
dc.subject.keywordPlus | Aho-Corasick | - |
dc.subject.keywordPlus | Compact size | - |
dc.subject.keywordPlus | Efficient implementation | - |
dc.subject.keywordPlus | Lookup time | - |
dc.subject.keywordPlus | Multiple-pattern matching | - |
dc.subject.keywordPlus | Network intrusion detection systems | - |
dc.subject.keywordPlus | Algorithms | - |
dc.subject.keywordPlus | Computer crime | - |
dc.subject.keywordPlus | Data structures | - |
dc.subject.keywordPlus | Linearization | - |
dc.subject.keywordPlus | Pattern matching | - |
dc.subject.keywordPlus | Powders | - |
dc.subject.keywordPlus | Intrusion detection | - |
dc.subject.keywordAuthor | Aho-Corasick | - |
dc.subject.keywordAuthor | Multiple pattern matching | - |
dc.subject.keywordAuthor | Network intrusion detection | - |
dc.subject.keywordAuthor | Trie | - |
dc.subject.keywordAuthor | Wu-Manber | - |
dc.identifier.url | https://ieeexplore.ieee.org/document/5360944 | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
222, Wangsimni-ro, Seongdong-gu, Seoul, 04763, Korea+82-2-2220-1365
COPYRIGHT © 2021 HANYANG UNIVERSITY.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.