期刊文献+

一种基于BM算法的改进模式匹配算法研究 被引量:7

Research of Improved Pattern Matching Algorithm Based on BM Algorithm
下载PDF
导出
摘要 基于模式匹配的检测方法是目前入侵检测系统的一种重要方法,因此作为模式匹配方法核心的字符串匹配算法直接影响入侵检测系统的性能和效率。在研究现有算法的基础上提出一种改进的模式匹配算法——New-Search算法。该算法以BM算法为基础,通过预处理阶段处理,首末字符部分定位的思想,增加字符跳转距离,比较稳定地减少匹配过程中字符比较的次数,提高了匹配的速度和效率。 The detecting method based on pattern matching is an important method in intrusion detection system, the key of this is the efficiency of string matching which influences the efficiency of detection directly, An improved pattern matching algorithm named New - Search which is based on BM algorithm is proposed. This algorithm can increase the jumping distance of characters and decrease the comparison times in matching process through the pretreatment step,which takes the idea of the first and last characters' partial location.In this case,it improves the matching efficiency.
出处 《现代电子技术》 2009年第20期73-75,共3页 Modern Electronics Technique
关键词 入侵检测 模式匹配 KMP算法 BM算法 New—Search算法 intrusion detection pattern matching K MP algorithm BM algorithm New - Search algorithm
  • 相关文献

参考文献7

  • 1李庚,韩进,谢立.入侵检测中一种新的多模式匹配算法[J].计算机应用研究,2008,25(8):2474-2476. 被引量:8
  • 2Knuth D E,Morris J H,Pratt V R.Fast Pattern Matching in Strings[J].SIAM Comput.,1977,6(2):323-350.
  • 3Boyer R S,Moore J S.A Fast String Searching Algorithm[J].Commun.ACM,1977,20(10):762-772.
  • 4Sunday D M.A Very Fast Substring Search Algorithm[J].Commun.ACM,1990,33(8):132-142.
  • 5Aho A V,Corasiek M J.Efficient String Matching:An Aid to Bibliographic Search[J].Commun.ACM,1975,18 (6):333-340.
  • 6谭汉松,彭诗力.一种新的快速多模式匹配算法[J].计算机工程,2005,31(18):119-120. 被引量:5
  • 7蓝华.基于网络匹配的入侵检测系统的研究与设计[D].长春:吉林大学,2005.

二级参考文献16

  • 1杨东红,徐恪,崔勇.改进的Wu-Manber多模式串匹配算法[J].清华大学学报(自然科学版),2006,46(4):555-558. 被引量:13
  • 2蒋建春 冯登国.网络入侵检测原理与技术[M].北京:国防工业出版社,2000..
  • 3奚嘉迪.后浪推前浪--新老IDS技术的比较[EB/OL].http://www. ccw.com.cn/htm/produ/,2002.
  • 4Apostolico A, Giancarlo R. The Boyer-Moore-Galil String Searching Strategies Revisited[J]. SIAM J. Comput., 1986, 15(1): 98-105
  • 5Coit C J, Staniford S, McAlerney J. Towards Faster Pattern Matching for Intrusion Detection or Exceeding the Speed of Snort[C]. In: DARPA Infromation Surcicability Conference and Exposition, 2001
  • 6KNUTH D E,MORRIS H,PRATT V R.Fast pattern matching in strings[J].SIAM J Comp,1977,6(1):323-350.
  • 7BOYER R S,MOORE J S.A fast string searching algorithm[J].Communications of the ACM,1977,20(10):762-772.
  • 8SUNDAY D M.A very fast substring search algorithm[J].Communications of the ACM,1990,33(8):132-142.
  • 9AHO A V,CORASICK M J.Efficient string matching:an aid to bibliographic search[J].Communications of the ACM,1975,18(6):333-340.
  • 10WU Sun,MANBER U.A fast algorithm for Multi-pattern searching[R].Tucson:Department of Computer Science,University of Arizona,1994.

共引文献11

同被引文献39

  • 1王成,刘金刚.一种改进的字符串匹配算法[J].计算机工程,2006,32(2):62-64. 被引量:26
  • 2杨薇薇,廖翔.一种改进的BM模式匹配算法[J].计算机应用,2006,26(2):318-319. 被引量:25
  • 3国家计算机网络应急技术处理协调中心.CNCERT/CC2007年网络安全工作报告[EB/OL].http ://www. cert. org. cn/UserFiles/File/CNCERTCC2007 AnnualReport_Chinese. pdf,2007-08-21.
  • 4KNUTHDE, MORRISJH, PRATTVR. Fast pattern matching in string [J]. SIAM Journal on Computing, 1977,20 (6) :323 -350.
  • 5BOYER R S, MOORE J S. A fast string searching algorithm [ J ] . Communications of the ACM, 1977,20 (10) : 762 - 772.
  • 6HORSPOOL R N. Practical fast searching in strings [ J ]. Software Practice and Experience, 1980 ( 10 ) : 501 - 506.
  • 7Daniel M S. Very Fast Substring Search Algorithm [ J ]. Communications of the ACM, 1990,33 ( 8 ) : 132 - 142.
  • 8Zhang W, Xu S, Zhang S. Association Rule Mining for Reasonable Curriculum Arrangement: A case study of Zhe- jiang University of Finance and Economics [J]. Interna- tional Journal of Information Processing & Management, 2015, 6(2) : 42 -47.
  • 9Zhang J, Wang S, Lv H, et al. Research on Application of FP - growth Algorithm for Lottery Analysis [M]//LISS 2013. Springer Berlin Heidelberg, 2015 : 1227 - 1231.
  • 10Shrivastava N, Khanna R. FP- Growth Tree Based Algo- rithms Analysis: CP- Tree and K Map[J]. Binary Journal of Data Mining & Networking, 2015, 5 ( 1 ) : 26 - 29.

引证文献7

二级引证文献34

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部