2010
DOI: 10.1016/j.cose.2010.05.001
|View full text |Cite
|
Sign up to set email alerts
|

Efficient hardware support for pattern matching in network intrusion detection

Abstract: Abstract-Deep packet inspection forms the backbone of any Network Intrusion Detection (NID) system. It involves matching known malicious patterns against the incoming traffic payload. Pattern matching in software is prohibitively slow in comparison to current network speeds. Due to the high complexity of matching, only FPGA (Field-Programmable Gate Array) or ASIC (Application-Specific Integrated Circuit) platforms can provide efficient solutions. FPGAs facilitate target architecture specialization due to their… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2011
2011
2022
2022

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 22 publications
(5 citation statements)
references
References 25 publications
0
5
0
Order By: Relevance
“…An off-line optimization method first finds common sub-patterns across all the patterns in the SNORT database of signatures. For that, we based on work [12,13] to make implement the part pattern-matching. To manage the pattern-matching, we have developed an FPGA design by VHDL (VHSIC hardware description language; VHSIC, very-high-speed integrated circuits).…”
Section: Implementation Of Components Snort On Our Platformmentioning
confidence: 99%
“…An off-line optimization method first finds common sub-patterns across all the patterns in the SNORT database of signatures. For that, we based on work [12,13] to make implement the part pattern-matching. To manage the pattern-matching, we have developed an FPGA design by VHDL (VHSIC hardware description language; VHSIC, very-high-speed integrated circuits).…”
Section: Implementation Of Components Snort On Our Platformmentioning
confidence: 99%
“…A custom-tailored hardware such as embedded FPGA can achieve better energyefficiency with higher detection speed. Previous works on hardware based intrusion detection are mainly based on machine learning pre-trained models [38,41]. However, it suffers from two limitations.…”
Section: Iot Based Network Intrusion Detection Systemmentioning
confidence: 99%
“…In doing so a reduction of 24% in the cost is achieved. Guinde and Ziavras [7] proposed a compression method for the string set where the required memory for storing the set is significantly reduced. In [11], they propose MIN-MAX algorithm for solving ambiguity and overlapped matching for Character Classes with Constraint Repetitions based Regular Expressions.…”
Section: Related Workmentioning
confidence: 99%