期刊文献+

A Stream Pattern Matching Method for Traffic Analysis

A Stream Pattern Matching Method for Traffic Analysis
下载PDF
导出
摘要 In order to identify any traces of suspicious activities for the networks security, Network Traffic Analysis has been the basis of network security and network management. With the continued emergence of new applications and encrypted traffic, the currently available approaches can not perform well for all kinds of network data. In this paper, we propose a novel stream pattern matching technique which is not only easily deployed but also includes the advantages of different methods. The main idea is: first, defining a formal description specification, by which any series of data stream can be unambiguously descrbed by a special stream pattern; then a tree representation is constructed by parsing the stream pattern; at last, a stream pattern engine is constructed with the Non-t-mite automata (S-CG-NFA) and Bit-parallel searching algorithms. Our stream pattern analysis system has been fully prototyped on C programming language and Xilinx Vn-tex2 FPGA. The experimental results show the method could provides a high level of recognition efficiency and accuracy.
出处 《China Communications》 SCIE CSCD 2010年第6期86-93,共8页 中国通信(英文版)
基金 This work is supported by the following projects: National Natural Science Foundation of China grant 60772136, 111 Development Program of China NO.B08038, National Science & Technology Pillar Program of China NO.2008BAH22B03 and NO. 2007BAH08B01.
关键词 traffic analysis stream pattern match non-finite automata bit-parallel 匹配方法 交通模式 网络流量分析 网络安全 Xilinx 程序设计语言 流模式 网络管理
  • 相关文献

参考文献13

  • 1SEN S, SPATSCHECH O, WANG D. Accurate, Scalable In-Network Identification of P2P Traffic Using Application Signatures [C]// Proceedings of the 13th International Conference on World Wide Web, New York, 2004.
  • 2KANG H, KIM M, HONG J. A Method on Multimedia Service Traffic Monitoring and Analysis [J]. Lecture Notes in Computer Science. Heidelberg, Germany, 2004, 2867: 489-501.
  • 3LEVANDOSK J, SOMMER E, STRAIT M. Application Layer Packet Classifier for Linux[CP/OL]. http://17-filter. sourceforge.net/, 2006.
  • 4ZUEV D, MOORE A W. Traffic Classification Using a Statistical Approach[J]. Lecture Notes in Computer Science, 2005, 3431 : 321-324.
  • 5MOORE A, ZUEV D, CROGAN M. Discriminators for Use in Flow based Classification [D]. Department of Computer Science, Queen Mary, University of London, 2005.
  • 6BERRY G, SETHI R. From Regular Expression to Deterministic Automata. Theoretical Computer Science, 1986, 48(1): 117-126.
  • 7CHANG C H, PAIGE R. From Regular Expression to DFA's Using NFA's [ C]// Proceedings of the 3rd Annual Symposium on Combinatorial Pattern Matching. Lecture Notes in Computer Science. Springer-Verlag, 1992, 644: 90-110.
  • 8KILPEL? INEN P, TUHKANEN R. Regular Expressions with Numerical Occurrence Indicators-preliminary Results [C]//Proceedings of the Eighth Symposium on Programming Languages and Software Tools. Kuopio, Finland, 2003, 163-173.
  • 9KILPEL? INEN P, UHKANEN R T. One-unambiguity of Regular Expressions with Numeric Occurrence Indicators [J]. Information Compute, 2007, 205 (6): 890-916.
  • 10BECCHI M, CROWLEY P. Extending Finite Automata to Efficiently Match Perl-Compatible Regular Expressions [C]// Proceedings of the 2008 ACM Conference on E-merging Network Experiment and Technology. Madrid, Spain, 2008.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部