2005
DOI: 10.1145/1080695.1069981
|View full text |Cite
|
Sign up to set email alerts
|

A High Throughput String Matching Architecture for Intrusion Detection and Prevention

Abstract: Network Intrusion Detection and Prevention Systems have emerged as one of the most effective ways of providing security to those connected to the network, and at the heart of almost every modern intrusion detection system is a string matching algorithm. String matching is one of the most critical elements because it allows for the system to make decisions based not just on the headers, but the actual content flowing through the network. Unfortunately, checking every byte of every packet to see if it matches on… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
146
0

Year Published

2006
2006
2019
2019

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 178 publications
(146 citation statements)
references
References 31 publications
0
146
0
Order By: Relevance
“…Since Cho's [2] is an ASIC implementation, it has a large clock frequency at the cost of rigidity to updates. Also, another ASIC solution in [18] involves memory tiles where a 2-bit input selects one of four finite state machines. Although [18] does not list the number of patterns in the implementation, it contains a comparison with the design proposed in [11] that assumes 1466 rules with 18,031 characters.…”
Section: Comparison With Earlier Approachesmentioning
confidence: 99%
See 2 more Smart Citations
“…Since Cho's [2] is an ASIC implementation, it has a large clock frequency at the cost of rigidity to updates. Also, another ASIC solution in [18] involves memory tiles where a 2-bit input selects one of four finite state machines. Although [18] does not list the number of patterns in the implementation, it contains a comparison with the design proposed in [11] that assumes 1466 rules with 18,031 characters.…”
Section: Comparison With Earlier Approachesmentioning
confidence: 99%
“…Also, another ASIC solution in [18] involves memory tiles where a 2-bit input selects one of four finite state machines. Although [18] does not list the number of patterns in the implementation, it contains a comparison with the design proposed in [11] that assumes 1466 rules with 18,031 characters. The work in [18] uses 3200 Kbits of memory, yielding a memory consumption ratio of 181.7 bits per character which is quite high compared to our design (see Table II).…”
Section: Comparison With Earlier Approachesmentioning
confidence: 99%
See 1 more Smart Citation
“…A large number of comparisons are required for dealing with multiple characters, as shown in Figure 1, because all possible combinations of characters are compared against the input string in parallel. The deterministic finite automata (DFA) approach [2,7,10] uses a state machine to track partial pattern matches across clock cycles. A DFA will take in a string of input character.…”
Section: B Fpga Solutionsmentioning
confidence: 99%
“…FPGA-based work in this regard has investigated the use of non-deterministic finite automata to match regular expressions [28,29], compiling regular expressions into deterministic finite automata [30], and then quickly generating new, compiled FPGA binaries [31]. Other custom hardware efforts, not specific to FPGAs, have investigated building optimized Aho-Corasick trees for sets of strings [32] and specialized architectures based on collections of highly optimized tiny state machines, each of which looks for a portion of a string [33].…”
Section: Related Workmentioning
confidence: 99%