期刊文献+

基于Aho-Corasick算法的多模式匹配算法研究 被引量:16

Research on multi-pattern matching algorithms based on Aho-Corasick algorithm
下载PDF
导出
摘要 通过分析模式匹配算法在网络入侵检测中的重要作用和所面临的问题,对Aho-Corasick基于自动机的算法和以Aho-Corasick算法为基础的相关算法进行了分析,并通过实验对多种多模式匹配算法进行综合对比,最后对多模式匹配方法的发展趋势进行了展望。 This paper analyzed the important role of pattern matching in the Web intrusion detection and problems proposed right now,and then surveyed the Aho-Corasick algorithm based on automata and some related algorithms based on Aho-Corasick algorithms.Through experiments on a variety of multi-pattern matching algorithm for integrated comparison,predicted the developing trend in the end.
作者 王培凤 李莉
出处 《计算机应用研究》 CSCD 北大核心 2011年第4期1251-1253,1259,共4页 Application Research of Computers
基金 国家自然科学基金资助项目(60873002)
关键词 AHO-CORASICK算法 多模式匹配 自动机 Aho-Corasick algorithm multi-pattern matching automata
  • 相关文献

参考文献9

  • 1AHO A V, CORASICK M J. Efficient string matching: an aid to bibliographie search [ J ]. Communications of the ACM, 1975,18 ( 6 ) : 333- 340.
  • 2TAN Lin, SHERWOOD T. A high throughput string matching architecture for intrusion detection and prevention [ C]//Proc of the 32nd International Symposium on Computer Architecture. 2005 : 112-122.
  • 3DHARMAPURIKAR S, LOCKWOOD J. Fast and scalable pattern matching for network intrusion detection systems[ J ]. IEEE Journal on Selected Areas in Communications, 2006,24 ( 10 ) : 1781- 1792.
  • 4PIYACHON P,LUO Yah. Design of high performance pattern marching engine through compact deterministic finite automata[ C ]//Proc of the 45th Annual Design Automation Conference. New York: ACM Press, 2008 : 852 - 857.
  • 5TUCK N, SHERWOOD T,CALDER T, et al. Deterministic memory- efficient string matching algorithms for intrusion detection [ C ]//Proc of the 23rd Annual Joint Conference of IEEE Computer and Communications Societies. New Jersey:IEEE Press,2004:2628-2639.
  • 6张元竞,张伟哲.一种基于位图的多模式匹配算法[J].哈尔滨工业大学学报,2010,42(2):277-280. 被引量:12
  • 7王永成,沈州,许一震.改进的多模式匹配算法[J].计算机研究与发展,2002,39(1):55-60. 被引量:52
  • 8李庚,韩进,谢立.入侵检测中一种新的多模式匹配算法[J].计算机应用研究,2008,25(8):2474-2476. 被引量:8
  • 9范轩苗,郑宁,范渊.Web入侵检测系统高效多模式匹配算法[J].计算机应用研究,2009,26(4):1528-1531. 被引量:5

二级参考文献39

  • 1殷丽华,方滨兴.一种改进的多模式匹配算法[J].华中科技大学学报(自然科学版),2005,33(z1):300-303. 被引量:4
  • 2杨东红,徐恪,崔勇.改进的Wu-Manber多模式串匹配算法[J].清华大学学报(自然科学版),2006,46(4):555-558. 被引量:13
  • 3万国根,秦志光.改进的AC-BM字符串匹配算法[J].电子科技大学学报,2006,35(4):531-533. 被引量:20
  • 4蔡晓妍,戴冠中,杨黎斌.改进的多模式字符串匹配算法[J].计算机应用,2007,27(6):1415-1417. 被引量:11
  • 5GARCIA A, JUAN J, PIKATZA A, et al. Intrusion detection in Web applications using text mining [ J ]. Engineering Applications of Artificial Intelligence,2007,20(4) : 555-566.
  • 6DJEMAIEL Y, REKHIS S, BOUDRIGA N. Intrusion detection and tolerance:a global scheme[ J]. International Journal of Communication Systems,2008,21 (2) :211-230.
  • 7BRUSCHI D, PIGHIZZINI G. String distances and intrusion detection: bridging the gap between formal languages and computer security [ J ]. Theoretical I nformatics and Applications, 2006, 40 ( 2 ) :303 - 313.
  • 8KAI Hong-mei, ZHU Hong-bing, KEI E, et al. A novel intelligent intrusion detection, decision, response system [ J ]. IEICE Tmns on Fundamentals of Electronics, Communications and Computer Sciences ,2006, E89-A(6) : 1630-]637.
  • 9MARKATOS E P, ANTONATOS S. Exclusion-based signature matching for intrusion detection[ C ]//Proc of International Conference on Communications and Computer Networks. New Jersey: IEEE Press, 2002 : 146-152.
  • 10DHARMAPURIKAR S, KRISHAMURTHY P. Deep packet inspection using parallel bloom filters [ J ]. IEEE Micro,2004,24 (1) : 52- 61.

共引文献67

同被引文献116

引证文献16

二级引证文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部