期刊文献+

一种改进的模式匹配算法 被引量:9

Research and Improvement of Pattern Matching Algorithm
下载PDF
导出
摘要 本文分析了入侵检测系统中常用的模式匹配算法及现有的一些改进算法,在此基础上提出了一种新的改进算法,指出了进一步改进的方向。本文的算法利用了已匹配子串的信息,增大了模式串的右移量,提高了算法效率。试验结果表明该算法能够有效地减少模式串的移动次数,提高入侵检测系统的检测速度。 It is analyzed that the most popular BM algorithm and the improvement of BM algorithm in the network intrusion detection system in this paper . Based on the discussion ,an improved algorithm of BM is presented. It is also pointed out that the improving direction of the new algorithm in this paper. The matched data information is used in this algorithm to increase the right shift and improve the efficiency.The result of the experiment shows that this algorithm can effectively decrease the shift number of the pattern and increase the detecting velocity of the intrusion detection system.
作者 张丽霞 陈莉
出处 《微计算机信息》 北大核心 2008年第30期68-70,共3页 Control & Automation
关键词 模式匹配 BM算法 BM改进算法 pattern matching BM algorithms Improvement of BM algorithms
  • 相关文献

参考文献6

  • 1Boyer R S ,Moore J S . A Fast String Searching Algorithm [J ]. Commun ACM ,1977, 20 (10) : 762 - 772.
  • 2孙克雷.IDS中一种快速模式匹配算法[J].安徽理工大学学报(自然科学版),2006,26(3):52-55. 被引量:5
  • 3Coit C J, Staniford S,McMerney J.Towards faster patern matching for intrusion detection or exceeding the speed of snort[C]. DARPA Information Survivability Conference and Exposition,2001.
  • 4Hochberg J , Jackson K, Stallings C: An Automated System for Detecting Netwok Int rusion and Misuse [J ]. Computers and Security,1993, 12 (3) : 235- 248.
  • 5赵一瑾.一个改进的BM串匹配算法[J].计算机研究与发展,1998,35(1):45-48. 被引量:13
  • 6张虹,蔡焕夫,高平安,赵国红.入侵检测系统匹配规则的研究[J].微计算机信息,2006,22(11X):120-122. 被引量:6

二级参考文献8

  • 1贾志平,杨武,云晓春.一个分布式高效网络入侵检测系统[J].微计算机信息,2006(01X):33-35. 被引量:6
  • 2朱洪,算法设计和分析,1989年,132页
  • 3HOCHBERG J,JACKSON K,STALLINGS C.NADIR:An Automated System for Detecting Network Intrusion and Misuse[J].Computers and Security,1993,12(3):235-248.
  • 4SUNDAY D M.A very fast substring search algorithm[J].Comm ACM,1990,33(8):132-142.
  • 5ROBERT S BOYER,J STROTHER MOORE.A Fast String Searching Algorithm[J].Comm ACM,1977,10(10):762-772.
  • 6AHO A,CORASICK M.Efficient string matching.an aid to bibliographic search[J].Comm ACM,1975,(18):33-40.
  • 7S A Hofmeyr. An Immunological Model of Distributed Detection and Its Application to Computer Security [D] [PhD Dissertation],.Albuquerque, NM: The University of New Mexico, 1999
  • 8孙啸.生物信息学[EB/OL].东南大学.http://www.lmbe.seu.edu.cn/chenyuan/xsun/bioinfomatics/Web/CharpterThree/3.1.htm

共引文献21

同被引文献38

引证文献9

二级引证文献24

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部