IEEE INFOCOM 2014 - IEEE Conference on Computer Communications 2014
DOI: 10.1109/infocom.2014.6847977
|View full text |Cite
|
Sign up to set email alerts
|

Deep packet inspection with DFA-trees and parametrized language overapproximation

Abstract: IPSs determine whether incoming traffic matches a database of vulnerability signatures defined as regular expressions. DFA representations are popular, but suffer from the state-explosion problem. We introduce a new matching structure: a tree of DFAs where the DFA associated with a node overapproximates those at its children, and the DFAs at the leaves represent the signature set. Matching works top-down, starting at the root of the tree and stopping at the first node whose DFA does not match. In the common ca… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
11
0
1

Year Published

2015
2015
2024
2024

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(13 citation statements)
references
References 25 publications
1
11
0
1
Order By: Relevance
“…More specifically, when performing DPI on realworld network traffics, a successful matching occurs very rarely. According to our experiment result, only 0.39% of 400K real-world HTTP packets result in successful matching against 500 Snort patterns, according to other researcher [4] . is 0.27%.…”
Section: Introductionsupporting
confidence: 59%
See 1 more Smart Citation
“…More specifically, when performing DPI on realworld network traffics, a successful matching occurs very rarely. According to our experiment result, only 0.39% of 400K real-world HTTP packets result in successful matching against 500 Snort patterns, according to other researcher [4] . is 0.27%.…”
Section: Introductionsupporting
confidence: 59%
“…Fortunately, matching on these independent DFAs can be processed in parallel with the cost of more compute resources and memory bandwidth. Moreover, mDFA can be optimized by recursively grouping to CODFA-tree [4] to gain further memory cost reduction with more groups while sacrifice a little speed on average condition. Grouping the rules still may lead to lowering whole matching speed as the power of parallelism is limited.…”
Section: Related Workmentioning
confidence: 99%
“…The works closest to our NFA reduction techniques are [16] and [17]. In [16], the authors address the issue of softwarebased acceleration of matching REs describing network attacks in SNORT.…”
Section: Related Workmentioning
confidence: 99%
“…To avoid this problem, we propose the flow collect method based on the first time series. [16], and the other deep packet inspection (DPI) [17] characteristics can also be used to represent the flows in SDN. In this system the Real-time Detection Strategy module aims to select a n-tuple features to build a robust classification.…”
Section: A System Modelmentioning
confidence: 99%