Proceedings of the 5th ACM/IEEE Symposium on Architectures for Networking and Communications Systems 2009
DOI: 10.1145/1882486.1882495
|View full text |Cite
|
Sign up to set email alerts
|

Evaluating regular expression matching engines on network and general purpose processors

Abstract: In recent years we have witnessed a proliferation of data structure and algorithm proposals for efficient deep packet inspection on memory based architectures. In parallel, we have observed an increasing interest in network processors as target architectures for high performance networking applications.In this paper we explore design alternatives in the implementation of regular expression matching architectures on network processors (NPs) and general purpose processors (GPPs). Specifically, we present a perfo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
33
0

Year Published

2010
2010
2019
2019

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 47 publications
(33 citation statements)
references
References 15 publications
0
33
0
Order By: Relevance
“…The use of REs to describe attack signatures is well established in the literature [3], [23], [26], [24]. DFA representations for REs [10] offer deterministic matching time and memory bandwidth, but scan only one byte at a time.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The use of REs to describe attack signatures is well established in the literature [3], [23], [26], [24]. DFA representations for REs [10] offer deterministic matching time and memory bandwidth, but scan only one byte at a time.…”
Section: Related Workmentioning
confidence: 99%
“…They generate a compact representation similar to a DFA, but using additional memory and code. They however assume REs consisting of non-overlapping patterns interleaved by · * terms, an assumption that may not always be valid in practice [3]. Other techniques decrease the memory footprint of a DFA by performing state [12] or alphabet [2] compression, or more sophisticated forms of encoding [14].…”
Section: Related Workmentioning
confidence: 99%
“…", "*") in their signature representation [18]. Some patterns even contain more than 10 such wildcard fragments.…”
Section: Smmentioning
confidence: 99%
“…However, state-space explosion of the resulting DFA can greatly increase the amount of required memory, which could in turn impact the memory performance and even the practical feasibility of the solution. Various techniques were proposed to compress the state transition table (STT) of the DFA with nondeterministic features [8,14,17,18,24], achieving moderately high matching throughput [9]. These techniques, however, can be computationally expensive and are often designed a-posteriori to a particular set (or type) of regexes.…”
Section: Related Workmentioning
confidence: 99%