Efficient Regular Expression Pattern Matching for Network Intrusion Detection Systems using Modified Word-based Automata

被引:0
|
作者
Kumar, Pawan [1 ]
Singh, Virendra [2 ]
机构
[1] Indian Inst Sci, Supercomp Educ & Res Ctr, Bangalore 560012, Karnataka, India
[2] Indian Inst Technol, Dept Elect Engn, Bombay DEPT ELECT, Maharashtra, India
关键词
Regular Expressions; DPI; NIDS; Pattern Matching; DFA; NFA;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Network Intrusion Detection Systems (NIDS) intercept the traffic at an organization's network periphery to thwart intrusion attempts. Signature-based NIDS compares the intercepted packets against its database of known vulnerabilities and malware signatures to detect such cyber attacks. These signatures are represented using Regular Expressions (REs) and strings. Regular Expressions, because of their higher expressive power, are preferred over simple strings to write these signatures. We present Cascaded Automata Architecture to perform memory efficient Regular Expression pattern matching using existing string matching solutions. The proposed architecture performs two stage Regular Expression pattern matching. We replace the substring and character class components of the Regular Expression with new symbols. We address the challenges involved in this approach. We augment the Word-based Automata, obtained from the re-written Regular Expressions, with counter-based states and length bound transitions to perform Regular Expression pattern matching. We evaluated our architecture on Regular Expressions taken from Snort rulesets. We were able to reduce the number of automata states between 50% to 85%. Additionally, we could reduce the number of transitions by a factor of 3 leading to further reduction in the memory requirements.
引用
收藏
页码:103 / 110
页数:8
相关论文
共 50 条
  • [1] StriFA: Stride Finite Automata for High-Speed Regular Expression Matching in Network Intrusion Detection Systems
    Wang, Xiaofei
    Xu, Yang
    Jiang, Junchen
    Ormond, Olga
    Liu, Bin
    Wang, Xiaojun
    IEEE SYSTEMS JOURNAL, 2013, 7 (03): : 374 - 384
  • [2] EFFICIENT MULTIPLE PATTERN MATCHING ALGORITHMS FOR NETWORK INTRUSION DETECTION SYSTEMS
    Lee, Sunho
    Kim, Dong Kyue
    2009 IEEE INTERNATIONAL CONFERENCE ON NETWORK INFRASTRUCTURE AND DIGITAL CONTENT, PROCEEDINGS, 2009, : 609 - 613
  • [3] Research on Network Intrusion Detection Method based on Regular Expression Matching
    Wang, Yi
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (07): : 185 - 194
  • [4] A Systolic Regular Expression Pattern Matching Engine and its Application to Network Intrusion Detection
    Kawanaka, Yosuke
    Wakabayashi, Shin'ichi
    Nagayama, Shinobu
    PROCEEDINGS OF THE 2008 INTERNATIONAL CONFERENCE ON FIELD-PROGRAMMABLE TECHNOLOGY, 2008, : 297 - 300
  • [5] Efficient Pattern Matching Algorithm for Intrusion Detection Systems
    Yang, Wenjun
    SENSORS, MECHATRONICS AND AUTOMATION, 2014, 511-512 : 1178 - 1184
  • [6] An Efficient Pattern Matching Algorithm for Intrusion Detection Systems
    Anithakumari, S.
    Chithraprasad, D.
    2009 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE, VOLS 1-3, 2009, : 223 - +
  • [7] Efficient Pattern Matching on GPUs for Intrusion Detection Systems
    Tumeo, Antonino
    Villa, Oreste
    Sciuto, Donatella
    PROCEEDINGS OF THE 2010 COMPUTING FRONTIERS CONFERENCE (CF 2010), 2010, : 87 - 88
  • [8] Pattern matching acceleration for network intrusion detection systems
    Kim, S
    EMBEDDED COMPUTER SYSTEMS: ARCHITECTURES, MODELING, AND SIMULATION, 2005, 3553 : 289 - 298
  • [9] A Data Compression Scheme Using Adaptive Word-Based Pattern Matching
    Mowafi, Moad
    Kasasbeh, Dima
    Al-Omari, Faruq
    2017 8TH INTERNATIONAL CONFERENCE ON INFORMATION, INTELLIGENCE, SYSTEMS & APPLICATIONS (IISA), 2017, : 350 - 353
  • [10] Efficient Packet Pattern Matching for Gigabit Network Intrusion Detection using GPUs
    Hung, Che-Lun
    Wang, Hsiao-hsi
    Chang, Chin-Yuan
    Lin, Chun-Yuan
    2012 IEEE 14TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS & 2012 IEEE 9TH INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS (HPCC-ICESS), 2012, : 1612 - 1617