2008
DOI: 10.1007/978-3-540-89862-7_15
|View full text |Cite
|
Sign up to set email alerts
|

Fast Signature Matching Using Extended Finite Automaton (XFA)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
12
0

Year Published

2010
2010
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(12 citation statements)
references
References 19 publications
0
12
0
Order By: Relevance
“…While thisanalysis might be straightforward for simple rules (for example, rules only limited to the IP address and port information), its ineffectiveness becomes clear when more complex rules sets incorporating character counts andregular expressions (REs)are considered. In the past, IDS rules, and inparticular, regular expressions have been successfully modeled using various extensions of an automaton [16]. Following this direction IDS rules are modelledas a Deterministic Finite Automaton (DFA) that allows one to capture thesemantics of the rule.…”
Section: B Rule Analysismentioning
confidence: 99%
“…While thisanalysis might be straightforward for simple rules (for example, rules only limited to the IP address and port information), its ineffectiveness becomes clear when more complex rules sets incorporating character counts andregular expressions (REs)are considered. In the past, IDS rules, and inparticular, regular expressions have been successfully modeled using various extensions of an automaton [16]. Following this direction IDS rules are modelledas a Deterministic Finite Automaton (DFA) that allows one to capture thesemantics of the rule.…”
Section: B Rule Analysismentioning
confidence: 99%
“…Current IDS Capabilities: The field of signature matching mainly focuses on three types of signatures: strings, regular expressions (REs), and vulnerability-based signatures [4,19,26,25,7,24]. Despite continuous efforts to enhance the performance of the matching engine in current IDSes, the accuracy of such systems is hindered by the limited capabilities of regular expressions to represent all attacks as they incur a high number of false positives and false negatives.…”
Section: Related Workmentioning
confidence: 99%
“…Regular expression (RE) signatures can be represented in deterministic finite automaton (DFA) [26] or non-deterministic finite automaton (NFA) [9]. Smith et al [25] propose a combination of DFA and NFA called extended finite automaton (XFA) where a finite memory is manipulated by instructions attached to states and edges to track dependencies. An XFA is both memory-efficient and time-efficient.…”
Section: Related Workmentioning
confidence: 99%
“…While these methods offer significant performance improvements, they are limited in their application abilities. As such, XFA [17] is not capable of representing complex regular expressions owing to a potential exponential memory blow-up, while a hybrid automaton [6] relies on manually constructed regular expressions. Since the memory and time performance requirements are less critical in the inconsistency discovery process, we utilize an NFA approach for modeling attack signatures.…”
Section: Related Workmentioning
confidence: 99%
“…While this analysis might be straightforward for simple rules (for example, rules only limited to the IP address and port information), its ineffectiveness becomes clear when we consider more complex rules sets incorporating character counts and regular expressions (REs). In the past, IDS rules, and in particular, regular expressions have been successfully modeled using various extensions of an automaton [6,17]. We follow this direction and model IDS rules as a nondeterministic automaton (NFA) that allows one to capture the semantics of the rule.…”
Section: Nfa-based Approach To Rule Analysismentioning
confidence: 99%