2009 Second International Workshop on Knowledge Discovery and Data Mining 2009
DOI: 10.1109/wkdd.2009.111
|View full text |Cite
|
Sign up to set email alerts
|

A Fast and Configurable Pattern Matching Hardware Architecture for Intrusion Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2010
2010
2020
2020

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 11 publications
0
3
0
Order By: Relevance
“…Implementing Intrusion Detection Systems on FPGA is a topic that has been more or less discussed in literature. The topic was approached from different angles, since existing algorithms such as Wu-Manber [39] and Aho-Corasik [40], which could be efficient in accelerating rule-matching operations, are applicable to strings. However, the rule sets that intrusion detection systems like Snort use are based on regular expressions (regex).…”
Section: Related Work and Progress Beyond States-of-the-artmentioning
confidence: 99%
See 1 more Smart Citation
“…Implementing Intrusion Detection Systems on FPGA is a topic that has been more or less discussed in literature. The topic was approached from different angles, since existing algorithms such as Wu-Manber [39] and Aho-Corasik [40], which could be efficient in accelerating rule-matching operations, are applicable to strings. However, the rule sets that intrusion detection systems like Snort use are based on regular expressions (regex).…”
Section: Related Work and Progress Beyond States-of-the-artmentioning
confidence: 99%
“…The authors of [37] claim that their technique led to circuits that are more than twice as dense as other proposed designs, however the throughput necessary for processing at gigabit line speeds and even beyond was maintained. The IDS software versions like Snort use some rule matching algorithms (such as the above-mentioned Wu Manber [39] and Aho-Corasik [40]), which can be implemented on hardware in order to accelerate the detection operations [41]. These algorithms need to be redesigned in order to use regular expressions.…”
Section: Related Work and Progress Beyond States-of-the-artmentioning
confidence: 99%
“…Pattern matching can be performed implementing in hardware different algorithms used by software version of IDSs like Aho-Corasik [17] [14], or WuManber [3]. Moscola [5] proposed a Deterministic Finite Automata(DFA), supporting multi bytes comparisons and partial matches.…”
Section: Related Workmentioning
confidence: 99%