期刊文献+

入侵检测中的自适应模式匹配技术 被引量:3

Adaptive Pattern Matching Technology for Intrusion Detection
下载PDF
导出
摘要 模式匹配既是网络入侵检测系统(NIDS)的核心技术,也是NIDS中消耗资源最多的部分,并正在成为NIDS的性能瓶颈。现有的模式匹配算法大多采用静态定义的优化策略,没有考虑网络流量和入侵检测规则的特性。该文提出一种自适应的模式匹配算法AMPM,动态统计网络流量和规则组的特性,根据统计结果自动选择最合适的模式匹配算法。测试表明,AMPM使现有NIDS的性能提高了9.4%~29.1%,且对于大规则集具有更好的适应性。 Pattern matching computations dominate in the overall cost of running a Network Intrusion Detection System(NIDS). With network speed and the number of rules constantly increasing, pattern matching as a key component, is becoming the bottleneck in NIDS. Existing approaches to match pattern mostly apply statically-defined optimizations that do not take into account the characteristics of the network traffic and attack signatures. This paper proposes an adaptive multi-pattern matching algorithm specifically designed for network intrusion detection system, called AMPM. AMPM dynamically captures traffic and rules properties and intelligently selects the best suitable algorithm to detect packets. Experimental results show that the performance of existing NIDS applying AMPM improved by 9.4%-29.1% and AMPM is more appropriate for large rule set.
出处 《计算机工程》 CAS CSCD 北大核心 2009年第6期170-172,175,共4页 Computer Engineering
基金 广西自然科学基金资助项目(0728099)
关键词 自适应 模式匹配 入侵检测 网络安全 adaptive pattern matching intrusion detection network security
  • 相关文献

参考文献6

  • 1Wu S, Manber U. A Fast Algorithm for Multi-pattern Searching[R]. Department of Computer Science, University of Arizona, Technical Report: TR-94-17, 1994.
  • 2Aho A V, Corasick M J. Efficient String Matching: An Aid to Bibliographic Search[J]. Communications of the ACM, 1975, 18(6): 333-340.
  • 3Anagnostakis K G, Antonatos S, Markatos E P, et al. E2xB: A Domain-specific String matching Algorithm for Intrusion Detection[C]//Proceedings of the 18th IFIP International Information Security Conference. Boston, USA: Springer, 2003: 217-228.
  • 4Sinha S, Jahanian E Patel J M. WIND: Workload-aware Intrusion Detection[C]//Proceedings of Conf. on Recent Advances in Intrusion Detection. Berlin, Germany: Springer, 2006:290-310.
  • 5高朝勤,陈元琰,李梅.一种面向入侵检测的快速多模式匹配算法[J].计算机应用,2008,28(1):82-84. 被引量:8
  • 6隋毅,杜跃进.NIDS的改进研究[J].计算机工程,2007,33(9):120-122. 被引量:6

二级参考文献14

  • 1Anderson J P.Computer Security Threat Monitoring and Surveillance[R].Anderson Company,1980.
  • 2Denning D E.An Intrusion-detection Model[J].IEEE Transaction on Software Engineering,1987,13(2):222-232.
  • 32004年全国网络安全状况调查报告[R].北京:国家计算机网络应急技术处理协调中心,2005:10-22.
  • 4汪辉.NIDS误报、漏报的原因分析[N].中国计算机报(网络与通信),2003-09-01.
  • 5Roesch M.Snort 2 Lightweight Intrusion Detection for Networks[C]// Proceedings of the USENIX LISA'99 Conference.1999:229-238.
  • 6杜跃进.NIDS数据有效性的提高[R].北京:国家计算机网络应急技术处理协调中心,2005.
  • 7Roesch M.Passive Networks Discovery System & Asset-centric Security[R].Sourcefire Inc.,2004.
  • 8Stevens W R.TCP/IP Illustrated(Volume 1) The Protocols[M].Massachusetts:Addison-Wesley,1994.
  • 9FISK M, VARGHESE G. An analysis of fast string matching applied to content-based forwarding and intrusion detection, CS2001-0670 ( updated version) [ R]. San Diego: University of California, 2002.
  • 10BOYER R S, MOORE J S. A fast string searching algorithm [ J]. Communications of the ACM, 1977, 20(10) :762 -772.

共引文献12

同被引文献11

引证文献3

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部