期刊文献+

基于规则分组的DFA正则表达式匹配算法 被引量:2

Regular Expression Matching Algorithm for DFA Based on Rule Grouping
下载PDF
导出
摘要 模式匹配因误报率低和漏报率低被入侵检测所采用.在使用正则表达式构造DFA时,因状态爆炸导致匹配算法需要较多的存储空间和运行时间,算法效率低下,采用规则分组后,可以在一定程度上抑制状态爆炸问题.根据缓存中的历史记录对正则表达式进行分组,既能利用规则分组减少状态总数,抑制状态爆炸,又能减少因每次重新构建DFA所带来的开销,提高了匹配效率,有利于提高入侵检测的实时性、准确性和高效性. Pattern matching is adopted by intrusion detection because of low false alarm and missed alarm.When using regular expressions to construct DFA,the matching algorithm needs more storage space and run-ning time because of the state explosion.The efficiency of the algorithm is low.After using rule grouping,the problem of state explosion can be restrained to a certain extent.According to the history records in the cache,grouping regular expressions can not only reduce the total number of states by grouping rules,which suppresses the state explosion to a certain extent,but also reduce the overhead caused by reconstructing DFA each time,improve the efficiency,and help to improve the real-time,accuracy and efficiency of intrusion detection.
作者 朱俊 ZHU Jun(School of Computer and Information,Hefei University of Technology,Hefei 230009,China;Anhui Technical College of Water Resources and Hydroelectric Power,Hefei 231603,China)
出处 《湖南工程学院学报(自然科学版)》 2021年第2期49-53,共5页 Journal of Hunan Institute of Engineering(Natural Science Edition)
基金 安徽省高校自然科学重点研究项目(KJ2017A599,KJ2018A0944) 安徽省高校优秀拔尖人才培育项目(gxgnfx2019133) 安徽省高校质量工程项目(2018mooc305,2019cxtd059).
关键词 入侵检测系统 模式匹配 正则表达式 确定性有限自动机 intrusion detection system pattern matching regular expression deterministic finite automata
  • 相关文献

参考文献7

二级参考文献84

  • 1金晶,苏勇.一种改进的自适应遗传算法[J].计算机工程与应用,2005,41(18):64-69. 被引量:81
  • 2曹京,谭建龙,刘萍,郭莉.布尔表达式匹配问题研究[J].计算机应用研究,2007,24(9):70-72. 被引量:5
  • 3Sourceforge. Application layer packet classifier for Linux[OL]. [2012-07-09]. http://17-filter. sourceforge. net/.
  • 4Sourcefire. Inc. Snort : Home Page [OL]. [2012-07-09 ].http;//www. snort, org/.
  • 5Schaelicke L,Slabach T,Moore B,et al. Characterizing theperformance of network intrusion detection sensors [G]//LNCS 2820: Proc of the 6thInt Sympon Recent Advances inIntrusion Detection. Berlin: Springer, 2003: 155-172.
  • 6Lee W, Cabrera B, Thomas A, et al. Performanceadaptation in real-time intrusion detection systems [G]//LNCS 2516 : Proc of the 5th Int Sympon RecentAdvances inIntrusion Detection.Berlin: Springer, 2002 : 252-273.
  • 7Hopcroft J, Motwani R, Ullman J. Introduction toAutomata Theory, Languages, and Computation [M]. 3rded. EnglewoodCliffs, NJ : Prentice Hall,2006.
  • 8Liu Rongtai, Huang Nenfu, Chen Chihao,et al. A faststring-matching algorithm for network processor-basedintrusion detection system [J]. ACM Trans onEmbeddedComputing Systems, 2004,3(3) : 614-633.
  • 9Cho Y,Mangione-Smith W. Fast reconfiguring deep packetfilter for 1+ gigabit network [C]//Proc of IEEE FCCM'05.Los Alamitos, CA: IEEE ComputerSociety,2005 : 215-224.
  • 10Dharmapurikar S, Krishnamurthy P,Sproull T,et al. Deeppacket inspection using parallel Bloom filters [J]. IEEEMicro, 2004,24(1) : 52-61.

共引文献45

同被引文献17

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部