Efficient pattern matching algorithm for security and Binary Search Tree (BST) based memory system in Wireless Intrusion Detection System (WIDS)

被引:7
|
作者
Suresh, P. [1 ]
Sukumar, R. [2 ]
Ayyasamy, S. [3 ]
机构
[1] Sethu Inst Technol, Dept CSE, Pulloor, Tamil Nadu, India
[2] Jain Univ, Sch Engn & Technol, Dept CSE, JGI Global Campus, Bengaluru, Karnataka, India
[3] Dr NGP Inst Technol, Dept CSE, Coimbatore, Tamil Nadu, India
关键词
Wireless Intrusion Detection System (WIDS); Pattern matching; Finite automata; REGULAR-EXPRESSION; ARCHITECTURE;
D O I
10.1016/j.comcom.2019.11.035
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless Intrusion Detection System (WIDS) has been introduced for providing enhanced security level in WLANs, owing to the numerous and potentially devastating threats against it. WIDS are software- or hardware-based. The hardware-based approaches focus on memory efficiency in pattern matching. This paper proposes a pattern matching algorithm called All-Ready State Traversal pattern matching algorithm. This algorithm constructs the state traversal machine with 1280 bytes size, and enables users to store large sized string patterns in the pattern database. The state traversal machine facilitates the easy retrieval of these patterns through the path vector. Further, the proposed work also follows a number of basic ASCII characters with 128 bytes size; and designs the memory architecture using Binary Search Tree (BST) structure. The hardware generates the addresses of input strings. State traversal machine and bits split algorithms are used to merge together the common addresses of input strings. The merged addresses are encrypted and decrypted by Blowfish algorithm to allow the valid packets and to discard the invalid packets using WIDS. Thus, the proposed algorithm provides a significant reduction in memory usage than that of Aho-Corasick algorithm.
引用
收藏
页码:111 / 118
页数:8
相关论文
共 50 条
  • [11] A fast pattern matching algorithm for network processor-based intrusion detection system
    Liu, RT
    Huang, NF
    Kao, CN
    Chen, CH
    CONFERENCE PROCEEDINGS OF THE 2004 IEEE INTERNATIONAL PERFORMANCE, COMPUTING, AND COMMUNICATIONS CONFERENCE, 2004, : 271 - 275
  • [12] A fast pattern-matching algorithm for network intrusion detection system
    Sung, Jung-Sik
    Kang, Seok-Min
    Kwon, Taeck-Geun
    NETWORKING 2006: NETWORKING TECHNOLOGIES, SERVICES, AND PROTOCOLS; PERFORMANCE OF COMPUTER AND COMMUNICATION NETWORKS; MOBILE AND WIRELESS COMMUNICATIONS SYSTEMS, 2006, 3976 : 1157 - 1162
  • [13] The Research and Amelioration of Pattern-matching Algorithm in Intrusion Detection System
    Wu, Pei-fei
    Shen, Hai-juan
    2012 IEEE 14TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS & 2012 IEEE 9TH INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS (HPCC-ICESS), 2012, : 1712 - 1715
  • [14] Application of Set-based Multi-pattern Matching Algorithm for Intrusion Detection System
    Cao, Bin
    Lan, Hua
    Shen, Xuanjing
    Qian, Qingji
    2008 INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY APPLICATION, VOL III, PROCEEDINGS, 2008, : 706 - 710
  • [15] A new hierarchical intrusion detection system based on a binary tree of classifiers
    Ahmim, Ahmed
    Zine, Nacira Ghoualmi
    INFORMATION AND COMPUTER SECURITY, 2015, 23 (01) : 31 - 57
  • [16] Piranha: Fast and memory-efficient pattern matching for intrusion detection
    Antonatos, S
    Polychronakis, M
    Akritidis, P
    Anagnostakis, KG
    Markatos, EP
    SECURITY AND PRIVACY IN THE AGE OF UBIQUITOUS COMPUTING, 2005, 181 : 393 - 408
  • [17] Piranha: Fast and memory-efficient pattern matching for intrusion detection
    et al; International Communication Foundation; OTSUKA CORPORATION OTSUKA CORPORATION; Support Cent. Adv. Telecommun. Technol. Res.; Systems Development Laboratory,Hitachi Ltd; The Telecommunication Advancement Foundation (Springer Science and Business Media, LLC):
  • [18] A Hybrid Efficient Distributed Clustering Algorithm Based Intrusion Detection System to Enhance Security in MANET
    Rathish, C. R.
    Karpagavadivu, K.
    Sindhuja, P.
    Kousalya, A.
    INFORMATION TECHNOLOGY AND CONTROL, 2021, 50 (01): : 45 - 54
  • [19] Multi pattern matching algorithm for embedded computer network engineering intrusion detection system
    Cai, Yingying
    INTELLIGENT DECISION TECHNOLOGIES-NETHERLANDS, 2024, 18 (02): : 705 - 716
  • [20] Feature Subset Selection Using Binary Gravitational Search Algorithm for Intrusion Detection System
    Behjat, Amir Rajabi
    Mustapha, Aida
    Nezamabadi-pour, Hossein
    Sulaiman, Md. Nasir
    Mustapha, Norwati
    INTELLIGENT INFORMATION AND DATABASE SYSTEMS (ACIIDS 2013), PT II, 2013, 7803 : 377 - 386