期刊文献+

一种面向分布式无线网络的正则表达式匹配 被引量:1

Regular expression matching for distributed wireless network security
原文传递
导出
摘要 针对无线自组网的网络带宽受限、对实时性业务支持较差、安全性不高等弊端,提出一种基于正则表达式匹配的分布式网络安全系统匹配(DREM)方法,协同利用每个节点资源完成分布式无线网络的安全防御。以无线自组网为应用场景,以移动嵌入式无线节点为运算平台,将匹配过程分为预过滤阶段和验证阶段:预处理阶段过滤一部分不满足的条目,在验证阶段根据预处理阶段的结果简化条目验证。实验表明精确匹配的计算效率提升平均达到82.1%以上。匹配方案可以有效对数据包进行检测和访问控制,对于中规模或大规模分布式无线节点具有良好适用性。 There is a growing demand for wireless network systems to examine the contents of data packages to improve network security and application services. A regular expression matching approach is given for distributed wireless network security systems, DREM (distributed regular expression matching), which divides the matching into a prefiltering stage and a verification stage. In prefiltering stage, a part of items will be filtered out so that items can be matched much simpler in the verifying stage. Tests show that these strategies speedup the analyses of regular expressions by 82. 1 % for regular expression sets. Emulations show that this system can be applied in medium and large distributed wireless network systems.
出处 《清华大学学报(自然科学版)》 EI CAS CSCD 北大核心 2013年第12期1676-1681,1687,共7页 Journal of Tsinghua University(Science and Technology)
基金 国家自然科学基金资助项目(61272174 91018003)
关键词 无线网络 正则表达式 分布式正则表达式匹配(DREM) wireless network regular expression distributed regular expression matching (DREM)
  • 相关文献

参考文献20

  • 1Leiner B M, Ruther R J, et al. DARPA GloMo program global [J]. Personal Communications, Goals and challenges of the mobile information systems IEEE 1996, 3(2): 34-43.
  • 2Siegel N, Hall D, Walker C, et al. The tactical internet graybeard panel briefings [Z/OL]. (2013-6-18), http: //www. ado. army. mil/ Briefings/ Tact% 20Internet/Index. htm.
  • 3DENG Hongmei, WEI Li, Dharma P. Routing security in wireless Ad hoc networks [J]. IEEE Communications Magazine, 2002, 40(10) :70 - 75.
  • 4Eschenauer L, Gligor V D. A key-management scheme for distributed sensor networks [C]// Proceedings of the 9th ACM Conference on Computer and Communications Security. Washington DC, USA: Association for Computing Machinery Press, 2002: 41- 47.
  • 5Hu Y C, Johnson D B, Perrig A. SEAD: Secure efficient distance vector routing for mobile wireless Ad hoc networks [J]. Ad Hoc Networks, 2011, 1(1): 175-192.
  • 6Ahmeda S S. ID-based and threshold security scheme for ad hoc network [C]// IEEE ard International Conference on Communication Software and Networks (ICCSN). Xi'an, China: IEEE Press, 2011: 16-21.
  • 7Roesch M. Snort: Lightweight intrusion detection for networks [J]. LISA, 1999, 99(1): 229-238.
  • 8Prathapani A, Santhanam L, Agrawal D P. Detection of blackhole attack in a wireless mesh network using intelligent honeypot agents [J]. The JournaZ of Supercomputing, 2013, 1(1): 753-758.
  • 9Levandoski J, Sommer E, Strait M. Application layer packet classifier for Linux [Z/OL]. (2013-6-18), http: //17-fiher. sourceforge, net/.
  • 10Meiners C R, Patel J, Norige E, et al. Fast regular expression matching using small TCAMs for network intrusion detection and prevention systems [C]// Proceedings of the 19th USENIX conference on Security. USENIX Association. Washington DC, USA : The USENIX Association, 2010:111 - 126.

同被引文献13

引证文献1

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部