期刊文献+

基于TCAM的深部包检测技术研究与实现 被引量:2

Research and implementation of deep packet inspection technology based TCAM
下载PDF
导出
摘要 深度包检测技术(DPI)已成为网络信息安全的研究重点。基于硬件实现模式匹配的DPI技术凭借其更强的处理能力受到广泛关注。本文提出一种基于TCAM模式匹配的方法实现DPI,规则表项按字节分别存储在TCAM(三态内容寻址存储器)中,输入字符按不同字节与TCAM中内容进行匹配,提高了DPI中模式匹配的处理速度。针对该技术功耗大的缺点,提出BF(Bloom Filter)和TCAM相结合的两级模式匹配技术,BF可将较少可疑包转发给TCAM处理模块,从而降低了系统功耗,大大提高了系统处理速度。 Deep packet inspection (DPI) technology has become the research focus of network information security. DPI based on the hardware implementation has gained widely attention with its powerful processing ability. This thesis proposes an effective method based on TCAM (ternary content addressable memory) pattern matching to implement DPI. It increased the processing speed of DPI pattern matching that rule tables are stored in the TCAM according to the size in bytes, and input characters are matched with TCAM rules table according to the different byte. For the large power consumption of the technology, combination BF (Bloom Filter) with TCAM two level schema matching technology is proposed. BF will be forward less suspicious packet to the TCAM processing module, thereby reducing the power consumption of the system and greatly improving the processing speed.
作者 张丽果
出处 《电子设计工程》 2013年第10期184-187,共4页 Electronic Design Engineering
基金 国家自然科学基金重点项目(61136002) 国家自然科学基金(60976020 61272120) 陕西省教育厅科研计划项目(11JK1063) 陕西省工业公关计划(2011K06-47) 陕西省13115重大科技专项资助课题(2009ZDKG-43)
关键词 深度包检测 TCAM 规则表 模式匹配 deep packet inspection TCAM rule table pattern matching
  • 相关文献

参考文献6

二级参考文献19

  • 1赵峥嵘,李鹏,兰巨龙.TCAM表项管理算法研究[J].微计算机信息,2005,21(08X):38-40. 被引量:6
  • 2MandyAndress.计算机安全原理[M].机械工业出版社,2002..
  • 3Fang Yu. High Speed Deep Packet Inspection with Hardware Support. 2006. http://www.eecs.berkeley.edu/Pubs/TechRpts/2006/ ECS-2006-156.html.
  • 4[1]Gusfield D.Algorithms on Strings,Trees,and Sequences:Computer Science and Computational Biology[M].University of California Press,CA, 1997
  • 5[2]Charras C,Lecroq T.Exact String Matching Algorithms. 1997
  • 6[3]Boyer R S,Moore J S.A fast string searching algorithm[J].Communications of the ACM, 1977 ;20(10) :762~772
  • 7[4]Aho A,Corasick M.Efficient string matching:an aid to biliographic search[J].Comm ACM, 1975; 18:33~40
  • 8[5]Fiskyx M,Varghese G.Fast Content-Based Packet Handling for Intrusion Detection[R].UCSD Technical Report CS2001-0670,2001-05
  • 9[6]Coit C J,Staniford S,McAlemey J.Towards faster patern matching for intrusion detection or exceeding the speed of snort[C]. In:DARPA Information Survivability Conference and Exposition,2001
  • 10A Apostolico.R Giancarlo.The Boyer-Moore-Galil string searching strategies revisited[J].SIAM J Comput,1986;15(1):98-105.

共引文献80

同被引文献14

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部