期刊文献+

面向大规模长字符串集的高速硬件匹配机

High-speed hardware string matching engine for large-scale pattern set
下载PDF
导出
摘要 基于嵌入式平台的硬件字符串匹配机设计有3大挑战:处理速度、硬件资源消耗以及支持特征库的动态更新。根据ClamAV中94%的字符模式串中16bytes前缀互不相同的特征,提出一种基于定长前缀检测与不定长后缀验证相结合的匹配机。通过在Xilinx Virtex-6单一芯片上的实现得出该匹配机存储资源总消耗仅为0.84MB(0.84bits/char),系统时钟频率可达到230 MHz以上,匹配机完全基于存储器架构设计,可支持模式集的动态更新。 Speed,cost and flexibility to allow efficient dynamic updates are the three major challenges in the design of hardware string matching engine.After analyzing the properties of pattern sets in ClamAV database,more than 94% of patterns had distinct 16-byte prefix.A hardware string matching engine was presented based on the detection of fixed-length prefix and on-demand verification of variable-length suffix.After the implementation in one single device of Xilinx Virtex-6,the overall memory cost of the proposed design is only about 0.84 MB,i.e.0.84 bits per character of the ClamAV pattern set,and the system can process 1byte per cycle with clock rate 230 MHz.It allows efficient dynamic updates since it is designed under memory-based hardware architecture.
作者 王兴 鲍志伟
出处 《计算机工程与设计》 北大核心 2016年第9期2405-2410,共6页 Computer Engineering and Design
基金 香港研究资助局基金项目(CityU119809) 浙江省教育技术规划课题基金项目(JB125) 浙江省教育厅一般科研基金项目(Y201534483)
关键词 字符串匹配 深度包检测 模式匹配 入侵检测系统 硬件匹配机 string matching deep packet inspection pattern matching intrusion detection system hardware matching engine
  • 相关文献

参考文献5

二级参考文献92

  • 1彭诗力,谭汉松.基于特征值的多模式匹配算法及硬件实现[J].计算机工程与应用,2005,41(1):148-150. 被引量:5
  • 2屠振,梁进山,杨奎武.TCAM在高速路由查找中的应用及其FPGA实现[J].微计算机信息,2005,21(4):208-209. 被引量:5
  • 3卢思军,朱宏,李旭伟.深度包检测技术在防火墙中的应用探讨[J].成都信息工程学院学报,2005,20(1):5-8. 被引量:10
  • 4李伟男,鄂跃鹏,葛敬国,钱华林.多模式匹配算法及硬件实现[J].软件学报,2006,17(12):2403-2415. 被引量:42
  • 5Paxson V, Asanovic K, Dharmapurikar S, et al. Rethinking hardware support for network analysis and intrusion prevention. In: Proceedings of USENIX Workshop on Hot Topics in Security 2006. Vancouver: USENIX Press, 2006.
  • 6Estan C, Varghese G. New directions in traffic measurement and accounting. In: Proceedings of ACM SIGCOMM 2001. San Diego: ACM Press, 2001.
  • 7Lakshminarayanan K, Rangarajan A, Venkatachary S. Algorithms for advanced packet classification with ternary CAMs. In: Proceedings of ACM SIGCOMM 2005. Philadelphia: ACM Press, 2005.
  • 8Bonomi F, Mitzenmacher M, Panigrapy R, et al. Beyond Bloom filters: from approximate membership checks to approximate state machines. In: Proceedings of ACM SIGCOMM 2006. Pisa: ACM Press, 2006.
  • 9Roesch M. Snort c lightweight intrusion detection for networks. In: Proceedings of LISA 1999. Seattle: USENIX Press, 1999.
  • 10Paxon V. Bro: A system for detecting network intruders in real-time. Comput Networks, 1999, 31:2435- 2463.

共引文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部