Efficient Regular Expression Pattern Matching for Network Intrusion Detection Systems using Modified Word-based Automata

被引:0
|
作者
Kumar, Pawan [1 ]
Singh, Virendra [2 ]
机构
[1] Indian Inst Sci, Supercomp Educ & Res Ctr, Bangalore 560012, Karnataka, India
[2] Indian Inst Technol, Dept Elect Engn, Bombay DEPT ELECT, Maharashtra, India
关键词
Regular Expressions; DPI; NIDS; Pattern Matching; DFA; NFA;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Network Intrusion Detection Systems (NIDS) intercept the traffic at an organization's network periphery to thwart intrusion attempts. Signature-based NIDS compares the intercepted packets against its database of known vulnerabilities and malware signatures to detect such cyber attacks. These signatures are represented using Regular Expressions (REs) and strings. Regular Expressions, because of their higher expressive power, are preferred over simple strings to write these signatures. We present Cascaded Automata Architecture to perform memory efficient Regular Expression pattern matching using existing string matching solutions. The proposed architecture performs two stage Regular Expression pattern matching. We replace the substring and character class components of the Regular Expression with new symbols. We address the challenges involved in this approach. We augment the Word-based Automata, obtained from the re-written Regular Expressions, with counter-based states and length bound transitions to perform Regular Expression pattern matching. We evaluated our architecture on Regular Expressions taken from Snort rulesets. We were able to reduce the number of automata states between 50% to 85%. Additionally, we could reduce the number of transitions by a factor of 3 leading to further reduction in the memory requirements.
引用
收藏
页码:103 / 110
页数:8
相关论文
共 50 条
  • [41] An Efficient Multi-hash Pattern Matching Scheme for Intrusion Detection in FPGA-based Reconfiguring Hardware
    Kim, Byoungkoo
    Yoon, Seungyong
    Oh, Jintae
    PROCEEDINGS OF THE 8TH WSEAS INTERNATIONAL CONFERENCE ON APPLIED COMPUTER SCIENCE (ACS'08): RECENT ADVANCES ON APPLIED COMPUTER SCIENCE, 2008, : 199 - +
  • [42] A Synergetic Pattern Matching Method Based-on DHT Structure for Intrusion Detection in Large-scale Network
    Ma, Dong
    Wang, Yongjun
    Fu, Zhenlong
    CEIS 2011, 2011, 15
  • [43] Efficient graph pattern matching framework for network-based in-vehicle fault detection
    Baek, Sun Geol
    Kang, Dong Hyun
    Lee, Sungkil
    Eom, Young Ik
    JOURNAL OF SYSTEMS AND SOFTWARE, 2018, 140 : 17 - 31
  • [44] An efficient parzen-window based network intrusion detector using a pattern synthesis technique
    Viswanath, P
    Murty, MN
    Kambala, S
    PATTERN RECOGNITION AND MACHINE INTELLIGENCE, PROCEEDINGS, 2005, 3776 : 799 - 804
  • [45] Efficient Network Intrusion Detection Using PCA-Based Dimensionality Reduction of Features
    Abdulhammed, Razan
    Faezipour, Miad
    Musafer, Hassan
    Abuzneid, Abdelshakour
    2019 INTERNATIONAL SYMPOSIUM ON NETWORKS, COMPUTERS AND COMMUNICATIONS (ISNCC 2019), 2019,
  • [46] Efficient approach to early detection of lithographic hotspots using machine learning systems and pattern matching
    Wuu, Jen-Yi
    Pikus, Fedor G.
    Marek-Sadowska, Malgorzata
    DESIGN FOR MANUFACTURABILITY THROUGH DESIGN-PROCESS INTEGRATION V, 2011, 7974
  • [47] Analysis of a Payload-based Network Intrusion Detection System using Pattern Recognition Processors
    Iqbal, Irshad M.
    Calix, Ricardo A.
    2016 INTERNATIONAL CONFERENCE ON COLLABORATION TECHNOLOGIES AND SYSTEMS (CTS), 2016, : 398 - 403
  • [48] Intrusion Detection in IoT Systems Based on Deep Learning Using Convolutional Neural Network
    Pham Van Huong
    Le Duc Thuan
    Le Thi Hong Van
    Dang Viet Hung
    PROCEEDINGS OF 2019 6TH NATIONAL FOUNDATION FOR SCIENCE AND TECHNOLOGY DEVELOPMENT (NAFOSTED) CONFERENCE ON INFORMATION AND COMPUTER SCIENCE (NICS), 2019, : 448 - 453
  • [49] Preventing Input Type Validation Vulnerabilities Using Network Based Intrusion Detection Systems
    Sunkari, Venkatramulu
    Rao, C. V. Guru
    2014 INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING AND INFORMATICS (IC3I), 2014, : 702 - 706
  • [50] An efficient modeling algorithm for intrusion detection systems using C5.0 and Bayesian Network structures
    Nia, Fariba Younes
    Khalili, Mehdi
    2015 2ND INTERNATIONAL CONFERENCE ON KNOWLEDGE-BASED ENGINEERING AND INNOVATION (KBEI), 2015, : 1117 - 1123