Efficient pattern matching algorithm for security and Binary Search Tree (BST) based memory system in Wireless Intrusion Detection System (WIDS)

被引:7
|
作者
Suresh, P. [1 ]
Sukumar, R. [2 ]
Ayyasamy, S. [3 ]
机构
[1] Sethu Inst Technol, Dept CSE, Pulloor, Tamil Nadu, India
[2] Jain Univ, Sch Engn & Technol, Dept CSE, JGI Global Campus, Bengaluru, Karnataka, India
[3] Dr NGP Inst Technol, Dept CSE, Coimbatore, Tamil Nadu, India
关键词
Wireless Intrusion Detection System (WIDS); Pattern matching; Finite automata; REGULAR-EXPRESSION; ARCHITECTURE;
D O I
10.1016/j.comcom.2019.11.035
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless Intrusion Detection System (WIDS) has been introduced for providing enhanced security level in WLANs, owing to the numerous and potentially devastating threats against it. WIDS are software- or hardware-based. The hardware-based approaches focus on memory efficiency in pattern matching. This paper proposes a pattern matching algorithm called All-Ready State Traversal pattern matching algorithm. This algorithm constructs the state traversal machine with 1280 bytes size, and enables users to store large sized string patterns in the pattern database. The state traversal machine facilitates the easy retrieval of these patterns through the path vector. Further, the proposed work also follows a number of basic ASCII characters with 128 bytes size; and designs the memory architecture using Binary Search Tree (BST) structure. The hardware generates the addresses of input strings. State traversal machine and bits split algorithms are used to merge together the common addresses of input strings. The merged addresses are encrypted and decrypted by Blowfish algorithm to allow the valid packets and to discard the invalid packets using WIDS. Thus, the proposed algorithm provides a significant reduction in memory usage than that of Aho-Corasick algorithm.
引用
收藏
页码:111 / 118
页数:8
相关论文
共 50 条
  • [1] Memory Efficacious Pattern Matching Intrusion Detection System
    Dhivya, S.
    Dhakchianandan, D.
    Gowtham, A.
    Sujatha, Kola P.
    Kannan, A.
    2013 INTERNATIONAL CONFERENCE ON RECENT TRENDS IN INFORMATION TECHNOLOGY (ICRTIT), 2013, : 652 - 656
  • [2] A Survey of Pattern Matching Algorithm in Intrusion Detection System
    Gharaee, Hossein
    Seifi, Shokoufeh
    Monsefan, Nima
    2014 7th International Symposium on Telecommunications (IST), 2014, : 946 - 953
  • [3] An Improved Pattern Matching Algorithm in the Intrusion Detection System
    Zhang Ping
    Liu Jianghui
    MEASURING TECHNOLOGY AND MECHATRONICS AUTOMATION, PTS 1 AND 2, 2011, 48-49 : 203 - +
  • [4] Design of Intrusion Detection System Based on a New Pattern Matching Algorithm
    Zhang Hu
    2009 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND TECHNOLOGY, VOL I, PROCEEDINGS, 2009, : 545 - 548
  • [5] Research on Efficient Pattern Matching Algorithms in Intrusion Detection System
    Liu-xiaoxing
    Yu-ning
    2014 7TH INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTATION TECHNOLOGY AND AUTOMATION (ICICTA), 2014, : 509 - 512
  • [6] A pattern matching based network intrusion detection system
    Zhou Chunyue
    Liu Yun
    Zhang Hongke
    2006 9TH INTERNATIONAL CONFERENCE ON CONTROL, AUTOMATION, ROBOTICS AND VISION, VOLS 1- 5, 2006, : 1410 - +
  • [7] Efficient Pattern Matching Algorithm for Intrusion Detection Systems
    Yang, Wenjun
    SENSORS, MECHATRONICS AND AUTOMATION, 2014, 511-512 : 1178 - 1184
  • [8] An Efficient Pattern Matching Algorithm for Intrusion Detection Systems
    Anithakumari, S.
    Chithraprasad, D.
    2009 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE, VOLS 1-3, 2009, : 223 - +
  • [9] Memory Efficient String Matching Algorithm for Network Intrusion Management System
    余建明
    薛一波
    李军
    Tsinghua Science and Technology, 2007, (05) : 585 - 593
  • [10] FPGA-Based Parallel Pattern Matching Algorithm for Network Intrusion Detection System
    Yu, Jing
    Yang, Bo
    Sun, Ruiyuan
    Chen, Zhenxiang
    MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 458 - 461