Efficient long signature matching for gigabit intrusion detection sensors

被引:0
|
作者
Zhang, Kenong [1 ]
Gao, Ming [2 ]
Lu, Jiahua [1 ]
Guan, Xiaohong [2 ]
机构
[1] Xi An Jiao Tong Univ, Sch Elect Engn, Xian 710049, Peoples R China
[2] Xi An Jiao Tong Univ, Syst Engn Inst, Xian 710049, Peoples R China
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Network Intrusion Detection Systems (NIDS) require the sensors to inspect the packet payloads at line rates. However, the software-only NIDS can not handle the large signature set with thousands of patterns of different lengths at line rates. Ternary content-addressable memories (TCAMs) have gained wide acceptance in the industry for storing and searching patterns in routers. But one important problem blocked the way to deploy TCAMs as deep package matching engines for NIDS: long patterns matching. A novel high speed long patterns matching architecture using cascade TCAMs for large signature set based NIDS is presented in this paper. Simple and efficient systems to handle tens of thousands of signatures with thousands of bytes length each can be built on such architecture. The matching system using for current SNORT signature set can work at the speeds greater than 2 Gbps.
引用
收藏
页码:953 / 956
页数:4
相关论文
共 50 条
  • [21] Attack Signature Matching using Graphics Processors in High-Performance Intrusion Detection Systems
    Mahdinia, Payam
    Berenjkoob, Mehdi
    Vatankhah, Hedayat
    2013 21ST IRANIAN CONFERENCE ON ELECTRICAL ENGINEERING (ICEE), 2013,
  • [22] MapReduce Accelerated Signature-Based Intrusion Detection Mechanism (IDM) with Pattern Matching Mechanism
    Rao, Chinta Someswara
    Raju, K. Butchi
    SOFT COMPUTING IN DATA ANALYTICS, SCDA 2018, 2019, 758 : 157 - 164
  • [23] Efficient reconfigurable logic circuits for matching complex network intrusion detection patterns
    Clark, CR
    Schimmel, DE
    FIELD-PROGRAMMABLE LOGIC AND APPLICATIONS, PROCEEDINGS, 2003, 2778 : 956 - 959
  • [24] Database Intrusion Detection by Transaction Signature
    Rathod, Yagnik A.
    Chaudhari, M. B.
    Jethava, G. B.
    2012 THIRD INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION & NETWORKING TECHNOLOGIES (ICCCNT), 2012,
  • [25] Improving the performance of Signature-Based Network Intrusion Detection Sensors by multi-threading
    Haagdorens, B
    Vermeiren, T
    Goossens, M
    INFORMATION SECURITY APPLICATIONS, 2005, 3325 : 188 - 203
  • [26] Energy-Efficient Intrusion Detection with a Barrier of Probabilistic Sensors: Global and Local
    Chen, Jiming
    Li, Junkun
    Lai, Ten H.
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2013, 12 (09) : 4742 - 4755
  • [27] Energy-efficient border intrusion detection using wireless sensors network
    Yang, Tao
    Mu, Dejun
    Hu, Wei
    Zhang, HuiXiang
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2014,
  • [28] BiSME: A Hardware Coprocessor to Perform Signature Matching at Multi-Gigabit Rates
    Shankar, Subramanian Shiva
    Lin PinXing
    Herkersdorf, Andreas
    Wild, Thomas
    2018 IEEE 29TH INTERNATIONAL CONFERENCE ON APPLICATION-SPECIFIC SYSTEMS, ARCHITECTURES AND PROCESSORS (ASAP), 2018, : 227 - 235
  • [29] Energy-efficient border intrusion detection using wireless sensors network
    Tao Yang
    Dejun Mu
    Wei Hu
    HuiXiang Zhang
    EURASIP Journal on Wireless Communications and Networking, 2014
  • [30] An Efficient Intrusion Detection System based on Adaptive Acknowledgement with Digital Signature scheme in MANETs
    Santhi, G.
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATICS AND ANALYTICS (ICIA' 16), 2016,