期刊文献+

一种用于深度报文检测的DFA状态表压缩方法 被引量:1

Method to compress DFA transition table for deep packet inspection
下载PDF
导出
摘要 基于正则表达式进行深度报文检测在IDS/IPS、应用层协议识别等网络应用中具有重要作用。然而,采用DFA实现正则表达式需要大量的存储空间,限制了它的实际应用。将DFA状态转换表拆分成3个表,使用run-length编码进行压缩,并对压缩方法进行了优化。采用l7-filter中几个常用应用程序的正则表达式进行测试,结果表明该方法压缩效果一般在90%以上。 Deep packet inspection based on regular expressions has become extremely important due to its applications in IDS/ IPS,application protocol recognition,etc.However, DFA transition table of regular expressions require large amounts of memory,and this limits its practical application.This paper splits the DFA transition table into three tables,compresses the tables using runlength coding,and some optimizations are introduced.The test result using some normal applications in 17-filter indicates that the method has more than 90% compressing rate.
出处 《计算机工程与应用》 CSCD 北大核心 2008年第22期74-76,共3页 Computer Engineering and Applications
基金 国家科技支撑计划项目(No2007BAK34B02)
关键词 正则表达式 深度报文检测 确定有限自动机 状态转换表压缩 regular expression deep packet inspection DFA transition table compressing
  • 相关文献

参考文献12

  • 1陈亮,龚俭,徐选.基于特征串的应用层协议识别[J].计算机工程与应用,2006,42(24):16-19. 被引量:43
  • 2李伟男,鄂跃鹏,葛敬国,钱华林.多模式匹配算法及硬件实现[J].软件学报,2006,17(12):2403-2415. 被引量:42
  • 3SNORT network intrusion detection systerr[EB/OL].http://www.snort.org.
  • 4Bro intrusion detection system[EB/OL].http://www.bro-ids.org/.
  • 5Application layer packet classifier for Linux[EB/OL].http://17-filter. source forge.net/.
  • 6Hoperoft J E,Motwani R,Ullman J D.Introduetion to automata theory,languages, and computation[M].[S.l.] : Addison Wesley, 2001.
  • 7Sidhu R,Prasanna V K.Fast regular expression matching using FPGAs[C]//FCCM, 2001.
  • 8Sutton P.Partial character decoding for improved regular expression matching[C]//FPGAs, 2004.
  • 9Yu Fang,Chen Zhi-feng,Diao Yan-lei,et al.Fast and memory- efficient regular expression matching for deep packet inspection[C]// ANCS, 2006.
  • 10Kumar S,Dharmapurikar S,Yu F,et al.Algorithms to accelerate multiple regular expression matching for deep packet inspection[C]// ACM Sigcomm, 2006.

二级参考文献14

  • 1Subhabrata Sen,Jia Wang.Analyzing Peer-to-Peer Traffic across Large Networks[C].In:IEEE/ACM Transactions on Networking,NJ:IEEE Press,2004:219~232
  • 2IANA[S].http://www.iana.org/assignments/port-numbers
  • 3Myung-Sup Kim,Young J Won,James Won-Ki Hong.Application-Level Traffic Monitoring and an Analysis on IP Networks[J].ETRI Journal,2005;27(11):22~42
  • 4Subhabrata Sen,Oliver Spatscheck,Dongmei Wang.Accurate,Scalable In-Network Identification of P2P Traffic Using Application Signatures[C].In:Proceedings of the 13th international conference on World Wide Web,NY:ACM Press,2004:512~521
  • 5Luca Deri,NETikos,SPA.Improving passive packet capture:beyond device polling.http://jake.unipi.it/Ring.pdf,2004-10/2005-11
  • 6BitTorrent.http://www.bittorrent.com/protocol.html
  • 7Yoram Kulbak,Danny Bickson.The eMule Protocol Specification.http://ftp.citkit.ru/pub/sourceforge/e/em/emule/protocol_guide.pdf,2005 -01/2005-11
  • 8MSN Messenger Protocol.http://www.hypothetic.org/docs/msn/index.php
  • 9R Movva,W Lai.MSN Messenger Service 1.0 Protocol.http://www.hypothetic.org/docs/msn/sitev1/index.php,2003-09-/2005-11
  • 10Simple Mail Transfer Protocol[S].RFC 2821

共引文献82

同被引文献3

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部