2014
DOI: 10.5120/16909-6989
|View full text |Cite
|
Sign up to set email alerts
|

Feasible Study on Pattern Matching Algorithms based on Intrusion Detection Systems

Abstract: With the increasing popularity of web services, attackers are paying more attention to hack the web services and the servers on which they run. Thus the need of effective modern intrusion detection system has taken prime importance for any system. At present intrusion detection system (IDS) analysis module uses the pattern matching technology, which is applied in various problems in the field of information security, genetic algorithms and evolutionary algorithm. As one of the solution to intrusion detection p… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2016
2016
2016
2016

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 9 publications
0
1
0
Order By: Relevance
“…In such algorithms, optimization is based on the number of shifts performed during the execution and the length of each shift. Various applications of string matching are: Computational Molecular Biology [6], Voice Recognition [7], Intrusion detection in network [8], Object Recognition [9], Sequence/Sub-sequence and Image Detection, Plagiarism detection [10], Information security [11], Screen scrapers, Digital libraries, Word processors and natural language processing [12]. We will compare a set of eight such algorithms among themselves on the basis of the execution time on datasets of different types and pattern of different lengths.…”
Section: Introductionmentioning
confidence: 99%
“…In such algorithms, optimization is based on the number of shifts performed during the execution and the length of each shift. Various applications of string matching are: Computational Molecular Biology [6], Voice Recognition [7], Intrusion detection in network [8], Object Recognition [9], Sequence/Sub-sequence and Image Detection, Plagiarism detection [10], Information security [11], Screen scrapers, Digital libraries, Word processors and natural language processing [12]. We will compare a set of eight such algorithms among themselves on the basis of the execution time on datasets of different types and pattern of different lengths.…”
Section: Introductionmentioning
confidence: 99%