Pattern Matching using Layered STRIFA for Intrusion Detection
نویسندگان
چکیده
With the advent and explosive growth of the global Internet adaptive/automatic network intrusion and anomaly detection in wide area data networks is fast gaining critical research and practical importance. In order to detect intrusions in a network, need efficient IDS. Deep packet inspection (DPI) has the ability to inspect both packet headers and payloads to identify the attack signatures in order to protect Internet systems. Regular expression matching, despite its flexibility and efficiency in attack detection, brings high computation and storage complexities to NIDSs, making packet processing a bottleneck. Stride finite automata (StriFA), a new family of finite automata, to accelerate both string matching and regular expression matching with reduced memory consumption. To increase the efficiency of StriFA, a layered approach of attack detection by using KDD 99 DARPA dataset is integrated with StriFA. We demonstrate that attack detection accuracy can be achieved by using StriFA and high efficiency by implementing the Layered Approach. Keywords-StriFA, Probe, DoS, R2L, U2R, NIDS
منابع مشابه
Improvement and parallelization of Snort network intrusion detection mechanism using graphics processing unit
Nowadays, Network Intrusion Detection Systems (NIDS) are widely used to provide full security on computer networks. IDS are categorized into two primary types, including signature-based systems and anomaly-based systems. The former is more commonly used than the latter due to its lower error rate. The core of a signature-based IDS is the pattern matching. This process is inherently a computatio...
متن کاملAC-BM-GA Pattern Matching Algorithm Approach for Intrusion Detection
In network security, Intrusion Detection System plays a reasonable supplementary role for the firewall. It improves the security and reliability of the computer and helps protect computers from network attacks. At present intrusion detection system analysis module uses the pattern matching technology. In this article, through analyzing the advantages and disadvantages of the main pattern matchi...
متن کاملA Review of Intrusion Detection Method Based On Automatic Pattern Matching
Intrusion Detection System plays a reasonable supplementary role for the firewall in the network security. It can help protect computers from network attacks and improve the security and reliability of the computer. At present intrusion detection system analysis module uses the pattern matching technology. In this article an optimized algorithm was proposed through analyzing the advantages and ...
متن کاملA Software Architecture to Support Misuse Intrusion Detection
Misuse Intrusion Detecl.ion has traditionally been understood in the literature as the detection of specific, precisely representable techniques of computer system abuse. Pattern matching is well disposed to the representation and detection of such abuse. Each specific method of abuse can be represented as a pattern and many of these can be matched simultaneously against the audit logs generate...
متن کاملEfficient Reconfigurable Logic Circuits for Matching Complex Network Intrusion Detection Patterns
This paper presents techniques for designing pattern matching circuits for complex regular expressions, such as those found in network intrusion detection patterns. We have developed a pattern-matching coprocessor that supports all the pattern matching functions of the Snort rule language [3]. In order to achieve maximum pattern capacity and throughput, the design focuses on minimizing circuit ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2014