Efficient long signature matching for gigabit intrusion detection sensors

被引:0
|
作者
Zhang, Kenong [1 ]
Gao, Ming [2 ]
Lu, Jiahua [1 ]
Guan, Xiaohong [2 ]
机构
[1] Xi An Jiao Tong Univ, Sch Elect Engn, Xian 710049, Peoples R China
[2] Xi An Jiao Tong Univ, Syst Engn Inst, Xian 710049, Peoples R China
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Network Intrusion Detection Systems (NIDS) require the sensors to inspect the packet payloads at line rates. However, the software-only NIDS can not handle the large signature set with thousands of patterns of different lengths at line rates. Ternary content-addressable memories (TCAMs) have gained wide acceptance in the industry for storing and searching patterns in routers. But one important problem blocked the way to deploy TCAMs as deep package matching engines for NIDS: long patterns matching. A novel high speed long patterns matching architecture using cascade TCAMs for large signature set based NIDS is presented in this paper. Simple and efficient systems to handle tens of thousands of signatures with thousands of bytes length each can be built on such architecture. The matching system using for current SNORT signature set can work at the speeds greater than 2 Gbps.
引用
收藏
页码:953 / 956
页数:4
相关论文
共 50 条
  • [31] Novel FPGA-based signature match circuit for efficient network intrusion detection
    Ou, Chien-Min
    PROCEEDINGS OF THE 6TH WSEAS INTERNATIONAL CONFERENCE ON APPLIED COMPUTER SCIENCE, 2007, : 535 - +
  • [32] Research of pattern matching in intrusion detection
    Huang, JC
    Tian, JF
    Du, RZ
    Zhai, JQ
    2003 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-5, PROCEEDINGS, 2003, : 1877 - 1882
  • [33] FPGA-based intrusion detection system for 10 Gigabit Ethernet
    Katashita, Toshihiro
    Yamaguchi, Yoshinori
    Maeda, Atusi
    Toda, Kenji
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2007, E90D (12): : 1923 - 1931
  • [34] Detection of intrusion across multiple sensors
    Long, W
    Doyle, J
    Burke, G
    Szolovits, P
    SYSTEM DIAGNOSIS AND PROGNOSIS: SECURITY AND CONDITION MONITORING ISSUES III, 2003, 5107 : 141 - 149
  • [35] A Time- and Memory-Efficient String Matching Algorithm for Intrusion Detection Systems
    Sheu, Tzu-Fang
    Huang, Nen-Fu
    Lee, Hsiao-Ping
    GLOBECOM 2006 - 2006 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2006,
  • [36] An Analysis of Signature Overlaps in Intrusion Detection Systems
    Massicotte, Frederic
    Labiche, Yvan
    2011 IEEE/IFIP 41ST INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN), 2011, : 109 - 120
  • [37] An efficient network intrusion detection
    Chen, Chia-Mei
    Chen, Ya-Lin
    Lin, Hsiao-Chung
    COMPUTER COMMUNICATIONS, 2010, 33 (04) : 477 - 484
  • [38] Detection of DoS attacks using intrusion detection sensors
    Ramakrishna, P
    Maarof, MA
    APOC 2002: ASIA-PACIFIC OPTICAL AND WIRELESS COMMUNICATIONS; NETWORK DESIGN AND MANAGEMENT, 2002, 4909 : 69 - 80
  • [39] Efficient algorithms for intrusion detection
    Boora, NK
    Bhattacharyya, C
    Gopinath, K
    DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, PROCEEDINGS, 2004, 3347 : 346 - 352
  • [40] A Reconfigurable Multi-Byte Regular-Expression Matching Architecture for Signature-Based Intrusion Detection
    Badran, Tamer F.
    Ahmad, Hany H.
    Abdelgawad, Mohamad
    2008 3RD INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES: FROM THEORY TO APPLICATIONS, VOLS 1-5, 2008, : 2571 - 2574