메뉴 건너뛰기




Volumn 38, Issue 4, 2008, Pages 207-218

Deflating the big bang: Fast and scalable deep packet inspection with extended finite automata

Author keywords

Deep packet inspection; Regular expressions; Signature matching; Xfa

Indexed keywords

AUXILIARY VARIABLES; BIG BANGS; CISCO SYSTEMS; COMPILER OPTIMIZATIONS; DEEP PACKET INSPECTION; FIRST-PRINCIPLES; FORMAL MODELS; FOUR ORDERS; HIGH-SPEED; NETWORK SERVICES; PER-FLOW STATE; REGULAR EXPRESSIONS; RUN-TIME; RUNTIMES; SIGNATURE MATCHING; SIGNATURE SETS; STATE-SPACE EXPLOSIONS; STATE-SPACE REDUCTIONS; XFA;

EID: 65249094689     PISSN: 01464833     EISSN: 01464833     Source Type: Conference Proceeding    
DOI: 10.1145/1402946.1402983     Document Type: Conference Paper
Times cited : (181)

References (37)
  • 1
    • 0016518897 scopus 로고
    • Efficient string matching: An aid to bibliographic search
    • June
    • A. V. Aho and M. Corasick. Efficient string matching: An aid to bibliographic search. In Communications of the ACM, June 1975.
    • (1975) Communications of the ACM
    • Aho, A.V.1    Corasick, M.2
  • 3
    • 34548322723 scopus 로고    scopus 로고
    • Memory-efficient regular expression search using state merging
    • M. Becchi and S. Cadambi. Memory-efficient regular expression search using state merging. In IEEE Infocom 2007.
    • IEEE Infocom 2007
    • Becchi, M.1    Cadambi, S.2
  • 4
    • 77954026099 scopus 로고    scopus 로고
    • An improved algorithm to accelerate regular expression evaluation
    • M. Becchi and P. Crowley. An improved algorithm to accelerate regular expression evaluation. In ANCS 2007.
    • ANCS 2007
    • Becchi, M.1    Crowley, P.2
  • 5
    • 65249160476 scopus 로고    scopus 로고
    • B. Brodie, R., and D. Taylor. A scalable architecture for high-throughput regular-expression pattern matching. SIGARCH Comput. Archit. News, 34(2):191-202, 2006.
    • B. Brodie, R., and D. Taylor. A scalable architecture for high-throughput regular-expression pattern matching. SIGARCH Comput. Archit. News, 34(2):191-202, 2006.
  • 7
    • 35248849034 scopus 로고    scopus 로고
    • Scalable pattern matching for high-speed networks
    • April
    • C. R. Clark and D. E. Schimmel. Scalable pattern matching for high-speed networks. In IEEE FCCM, April 2004.
    • (2004) IEEE FCCM
    • Clark, C.R.1    Schimmel, D.E.2
  • 9
    • 85010849899 scopus 로고    scopus 로고
    • Denial of service via algorithmic complexity attacks
    • August
    • S. Crosby and D. Wallach. Denial of service via algorithmic complexity attacks. In Usenix Security, August 2003.
    • (2003) Usenix Security
    • Crosby, S.1    Wallach, D.2
  • 10
    • 33749822913 scopus 로고    scopus 로고
    • Fast and scalable pattern matching for network intrusion detection systems
    • S. Dharmapurikar and J. W. Lockwood. Fast and scalable pattern matching for network intrusion detection systems. IEEE Journal on Selected Areas in Comm., 24(10):1781-1792, 2006.
    • (2006) IEEE Journal on Selected Areas in Comm , vol.24 , Issue.10 , pp. 1781-1792
    • Dharmapurikar, S.1    Lockwood, J.W.2
  • 11
    • 65249098881 scopus 로고    scopus 로고
    • The Guardian. Trouble on the line, http http://technology.guardian.co.uk/ weekly/story/0,1747343,00.html, 2006.
    • The Guardian. Trouble on the line, http http://technology.guardian.co.uk/ weekly/story/0,1747343,00.html, 2006.
  • 12
    • 85084160972 scopus 로고    scopus 로고
    • Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics
    • August
    • M. Handley, V. Paxson, and C. Kreibich. Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics. In Usenix Security, August 2001.
    • (2001) Usenix Security
    • Handley, M.1    Paxson, V.2    Kreibich, C.3
  • 16
    • 65249133914 scopus 로고    scopus 로고
    • Myles Jordan. Dealing with metamorphism. Virus Bulletin Weekly, 2002.
    • Myles Jordan. Dealing with metamorphism. Virus Bulletin Weekly, 2002.
  • 17
    • 34547670827 scopus 로고    scopus 로고
    • Design of a web switch in a reconfigurable platform
    • C. Kachris and S. Vassiliadis. Design of a web switch in a reconfigurable platform. In ANCS 2006.
    • ANCS 2006
    • Kachris, C.1    Vassiliadis, S.2
  • 19
    • 77954013621 scopus 로고    scopus 로고
    • Curing regular expressions matching algorithms from insomnia, amnesia, and acalculia
    • S. Kumar, B. Chandrasekaran, J. Turner, and G. Varghese. Curing regular expressions matching algorithms from insomnia, amnesia, and acalculia. In ANCS 2007, pages 155-164.
    • ANCS 2007 , pp. 155-164
    • Kumar, S.1    Chandrasekaran, B.2    Turner, J.3    Varghese, G.4
  • 20
    • 34547700476 scopus 로고    scopus 로고
    • Algorithms to accelerate multiple regular expressions matching for deep packet inspection
    • September
    • S. Kumar, S. Dharmapurikar, F. Yu, P. Crowley, and J. Turner. Algorithms to accelerate multiple regular expressions matching for deep packet inspection. In ACM SIGCOMM, September 2006.
    • (2006) ACM SIGCOMM
    • Kumar, S.1    Dharmapurikar, S.2    Yu, F.3    Crowley, P.4    Turner, J.5
  • 21
    • 34547683816 scopus 로고    scopus 로고
    • Advanced algorithms for fast and scalable deep packet inspection
    • S. Kumar, J. Turner, and J. Williams. Advanced algorithms for fast and scalable deep packet inspection. In ANCS 2006, pages 81-92.
    • ANCS 2006 , pp. 81-92
    • Kumar, S.1    Turner, J.2    Williams, J.3
  • 22
    • 79551630961 scopus 로고    scopus 로고
    • A fast string-matching algorithm for network processor-based intrusion detection system
    • 614-633
    • R. Liu, N. Huang, C. Chen, and C. Kao. A fast string-matching algorithm for network processor-based intrusion detection system. Trans. on Embedded Computing Sys., 3(3):614-633, 2004.
    • (2004) Trans. on Embedded Computing Sys , vol.3 , Issue.3
    • Liu, R.1    Huang, N.2    Chen, C.3    Kao, C.4
  • 23
    • 61749104310 scopus 로고    scopus 로고
    • Niagara 2 opens the floodgates
    • November
    • H. McGhan. Niagara 2 opens the floodgates. In Microprocessor Report, November 2006.
    • (2006) Microprocessor Report
    • McGhan, H.1
  • 25
    • 65249129703 scopus 로고    scopus 로고
    • Deep packet inspection: A service provider's solution for secure VoIP
    • Oct
    • M. Neider. Deep packet inspection: A service provider's solution for secure VoIP. VoIP Magazine, Oct 2005.
    • (2005) VoIP Magazine
    • Neider, M.1
  • 26
    • 0033295259 scopus 로고    scopus 로고
    • Bro: A system for detecting network intruders in real-time
    • V. Paxson. Bro: a system for detecting network intruders in real-time. In Computer Networks, volume 31, pages 2435-2463, 1999.
    • (1999) Computer Networks , vol.31 , pp. 2435-2463
    • Paxson, V.1
  • 27
    • 37249008138 scopus 로고    scopus 로고
    • Insertion, evasion and denial of service: Eluding network intrusion detection
    • January
    • T. Ptacek and T. Newsham. Insertion, evasion and denial of service: Eluding network intrusion detection. In Secure Networks, Inc., January 1998.
    • (1998) Secure Networks, Inc
    • Ptacek, T.1    Newsham, T.2
  • 28
    • 0003539116 scopus 로고    scopus 로고
    • Snort - lightweight intrusion detection for networks
    • USENIX
    • M. Roesch. Snort - lightweight intrusion detection for networks. In 13th Systems Administration Conference. USENIX, 1999.
    • (1999) 13th Systems Administration Conference
    • Roesch, M.1
  • 29
    • 84899126047 scopus 로고    scopus 로고
    • Active mapping: Resisting nids evasion without altering traffic
    • May
    • U. Shankar and Vern Paxson. Active mapping: Resisting nids evasion without altering traffic. In IEEE Symp. on Security and Privacy, May 2003.
    • (2003) IEEE Symp. on Security and Privacy
    • Shankar, U.1    Paxson, V.2
  • 30
    • 39049092820 scopus 로고    scopus 로고
    • Backtracking algorithmic complexity attacks against a NIDS
    • R. Smith, C. Estan, and S. Jha. Backtracking algorithmic complexity attacks against a NIDS. In ACSAC 2006, pages 89-98.
    • ACSAC 2006 , pp. 89-98
    • Smith, R.1    Estan, C.2    Jha, S.3
  • 32
    • 14844324904 scopus 로고    scopus 로고
    • Enhancing byte-level network intrusion detection signatures with context
    • Oct
    • R. Sommer and V. Paxson. Enhancing byte-level network intrusion detection signatures with context. In ACM CCS, Oct. 2003.
    • (2003) ACM CCS
    • Sommer, R.1    Paxson, V.2
  • 34
    • 27544490145 scopus 로고    scopus 로고
    • A high throughput string matching architecture for intrusion detection and prevention
    • June
    • L. Tan and T. Sherwood. A high throughput string matching architecture for intrusion detection and prevention. In ISCA, June 2005.
    • (2005) ISCA
    • Tan, L.1    Sherwood, T.2
  • 35
    • 8344251916 scopus 로고    scopus 로고
    • Deterministic memory-efficient string matching algorithms for intrusion detection
    • N. Tuck, T. Sherwood, B. Calder, and G. Varghese. Deterministic memory-efficient string matching algorithms for intrusion detection. In IEEE INFOCOM 2004, pages 333-340.
    • (2004) IEEE INFOCOM , pp. 333-340
    • Tuck, N.1    Sherwood, T.2    Calder, B.3    Varghese, G.4
  • 36
    • 33750352075 scopus 로고    scopus 로고
    • Shield: Vulnerability-driven network filters for preventing known vulnerability exploits
    • August
    • H. J. Wang, C. Guo, D. Simon, and A. Zugenmaier. Shield: Vulnerability-driven network filters for preventing known vulnerability exploits. In ACM SIGCOMM, August 2004.
    • (2004) ACM SIGCOMM
    • Wang, H.J.1    Guo, C.2    Simon, D.3    Zugenmaier, A.4
  • 37
    • 34547662263 scopus 로고    scopus 로고
    • Fast and memory-efficient regular expression matching for deep packet inspection
    • F. Yu, Z. Chen, Y. Diao, T. V. Lakshman, and R. H. Katz. Fast and memory-efficient regular expression matching for deep packet inspection. In ANCS 2006.
    • ANCS 2006
    • Yu, F.1    Chen, Z.2    Diao, Y.3    Lakshman, T.V.4    Katz, R.H.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.