메뉴 건너뛰기




Volumn 12, Issue 5, 2007, Pages 585-593

Memory Efficient String Matching Algorithm for Network Intrusion Management System

Author keywords

Aho Corasick (AC) algorithm; network intrusion management system (NIMS); string matching

Indexed keywords

ALGORITHMS; COMPUTER NETWORKS; DATA REDUCTION; MANAGEMENT INFORMATION SYSTEMS; PROGRAM PROCESSORS;

EID: 34748816267     PISSN: 10070214     EISSN: None     Source Type: Journal    
DOI: 10.1016/S1007-0214(07)70137-2     Document Type: Article
Times cited : (12)

References (25)
  • 1
    • 85090433665 scopus 로고    scopus 로고
    • th System Administration Conference and Exhibition (LISA'1999). Berkeley, CA, USA: USENIX Assoc., 1999: 229-238.
  • 3
    • 3543088606 scopus 로고    scopus 로고
    • Generating realistic workloads for network intrusion detection systems
    • Antonatos S., Anagnostakis K., and Markatos E. Generating realistic workloads for network intrusion detection systems. Software Engineering Notes 29 1 (2004) 207-215
    • (2004) Software Engineering Notes , vol.29 , Issue.1 , pp. 207-215
    • Antonatos, S.1    Anagnostakis, K.2    Markatos, E.3
  • 4
    • 0016518897 scopus 로고
    • Fast pattern matching: An aid to bibliographic search
    • Aho A., and Corasick M. Fast pattern matching: An aid to bibliographic search. Communications of the ACM 18 6 (1975) 333-340
    • (1975) Communications of the ACM , vol.18 , Issue.6 , pp. 333-340
    • Aho, A.1    Corasick, M.2
  • 6
    • 84964497101 scopus 로고    scopus 로고
    • Coit C J, Staniford S, McAlerney J. Towards faster string matching for intrusion detection or exceeding the speed of Snort. In: Proceedings of the DARPA Information Survivability Conference and Exposition II (DISCEX'01). Los Alamitos, CA, USA: IEEE Comput. Soc., 2001, 1: 367-373.
  • 8
    • 84904280510 scopus 로고    scopus 로고
    • th IFIP International Information Security Conference (SEC2003). Athens, Greece: Kluwer Acadamic Pubhishers, 2003: 217-228.
  • 9
    • 1542375781 scopus 로고    scopus 로고
    • Huang J, Tian J, Du R, Zhai J. Research of pattern matching in intrusion detection. In: Proceedings of the 2003 International Conference on Machine Learning and Cybernetics. Piscataway, NJ, USA: IEEE, 2003, 3: 1877-1882.
  • 10
    • 79551630961 scopus 로고    scopus 로고
    • A fast string-matching algorithm for network processor-based intrusion detection system
    • Liu R., Huang N., Chen C., and Kao C. A fast string-matching algorithm for network processor-based intrusion detection system. ACM Transactions on Embedded Computing Systems 3 3 (2004) 614-633
    • (2004) ACM Transactions on Embedded Computing Systems , vol.3 , Issue.3 , pp. 614-633
    • Liu, R.1    Huang, N.2    Chen, C.3    Kao, C.4
  • 11
    • 19944424800 scopus 로고    scopus 로고
    • Real-time intrusion detection for high speed networks
    • Jiang W., Song H., and Dai Y. Real-time intrusion detection for high speed networks. Computers and Security 24 4 (2005) 287-294
    • (2005) Computers and Security , vol.24 , Issue.4 , pp. 287-294
    • Jiang, W.1    Song, H.2    Dai, Y.3
  • 12
    • 62349096286 scopus 로고    scopus 로고
    • A parallel NIDS pattern matching engine and its implementation on network processor
    • CSREA Press, Las Vegas, USA
    • Yu J., and Li J. A parallel NIDS pattern matching engine and its implementation on network processor. Proceedings of the 2005 International Conference on Security and Management (2005), CSREA Press, Las Vegas, USA 375-381
    • (2005) Proceedings of the 2005 International Conference on Security and Management , pp. 375-381
    • Yu, J.1    Li, J.2
  • 20
    • 8344251916 scopus 로고    scopus 로고
    • Deterministic memory-efficient string matching algorithms for intrusion detection
    • IEEE, Piscataway, NJ, USA
    • Tuck N., Sherwood T., Calder B., and Varghese G. Deterministic memory-efficient string matching algorithms for intrusion detection. Proceedings of IEEE INFOCOM 2004 4 (2004), IEEE, Piscataway, NJ, USA 2628-2639
    • (2004) Proceedings of IEEE INFOCOM 2004 , vol.4 , pp. 2628-2639
    • Tuck, N.1    Sherwood, T.2    Calder, B.3    Varghese, G.4
  • 21
    • 0017547820 scopus 로고
    • A fast string searching algorithm
    • Boyer R., and Moore J. A fast string searching algorithm. Communications of the ACM 20 10 (1977) 762-772
    • (1977) Communications of the ACM , vol.20 , Issue.10 , pp. 762-772
    • Boyer, R.1    Moore, J.2
  • 22
    • 84984028908 scopus 로고
    • Practical fast searching in strings
    • Horspool R. Practical fast searching in strings. Software Practice and Experience 10 6 (1980) 501-506
    • (1980) Software Practice and Experience , vol.10 , Issue.6 , pp. 501-506
    • Horspool, R.1
  • 25
    • 20444493210 scopus 로고    scopus 로고
    • Cowan C, Arnold S, Beattie S, Wright C, Viega J DEFCON capture the flag: Defending vulnerable code form intense attack. In: Proceedings of the DARPA DISCEX III Conference. Washington D C, USA, 2003.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.