2006
DOI: 10.1109/glocom.2006.284
|View full text |Cite
|
Sign up to set email alerts
|

NIS04-6: A Time- and Memory- Efficient String Matching Algorithm for Intrusion Detection Systems

Abstract: Intrusion Detection Systems (IDSs) are known as useful tools for identifying malicious attempts over the network. The most essential part to an IDS is the searching engine that inspects every packet through the network. To strictly defend the protectorate, an IDS must be able to inspect packets at line rate and also provide guaranteed performance even under heavy attacks. Therefore, in this paper we propose an efficient string matching algorithm (named ACM) with compact memory as well as high worst-case perfor… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2010
2010
2022
2022

Publication Types

Select...
2
2
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 13 publications
0
2
0
Order By: Relevance
“…Using a compressed structure, Tuck et al proposed the AC algorithm with memory compression (AC-C), a modification of AC, and reduced the required memory to about 2 percent of AC [8]. ACM applied a magic number derived from the Chinese Remainder Theorem to AC [14]. ACM reduced the required memory space and computation complexity, thus improving the worst-case performance.…”
Section: Previous Workmentioning
confidence: 98%
“…Using a compressed structure, Tuck et al proposed the AC algorithm with memory compression (AC-C), a modification of AC, and reduced the required memory to about 2 percent of AC [8]. ACM applied a magic number derived from the Chinese Remainder Theorem to AC [14]. ACM reduced the required memory space and computation complexity, thus improving the worst-case performance.…”
Section: Previous Workmentioning
confidence: 98%
“…In many practical applications, there are some limitations on using training data because of the following reasons: 1) producing training data is a time consuming and expensive task, 2) a limitation on memory exists for using all training data at the same time, and 3) not all training data are available at training time. For example, in Intrusion Detection Systems, not all training data are available at the same time and consideration of all data for training requires a huge amount of memory, which increases the training time considerably [1]. Similarly, in the classification of stream data, it is not possible to store all the data for using as training data [2].…”
Section: Introductionmentioning
confidence: 99%