Memory Efficient String Matching Algorithm for Network Intrusion Management System

来源 :Tsinghua Science and Technology | 被引量 : 0次 | 上传用户:luminfeng
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
As the core algorithm and the most time consuming part of almost every modern network intrusion management system (NIMS), string matching is essential for the inspection of network flows at the line speed. This paper presents a memory and time efficient string matching algorithm specifically designed for NIMS on commodity processors. Modifications of the Aho-Corasick (AC) algorithm based on the distribution characteristics of NIMS patterns drastically reduce the memory usage without sacrificing speed in software implementations. In tests on the Snort pattern set and traces that represent typical NIMS workloads, the Snort performance was enhanced 1.48%-20% compared to other well-known alternatives with an automaton size reduction of 4.86-6.11 compared to the standard AC implementation. The results show that special characteristics of the NIMS can be used into a very effective method to optimize the algorithm design. As the core algorithm and the most time consuming part of almost every modern network intrusion management system (NIMS), string matching is essential for the inspection of network flows at the line speed. This paper presents a memory and time efficient string matching algorithm specifically designed for NIMS on commodity processors. Modifications of the Aho-Corasick (AC) algorithm based on the distribution characteristics of NIMS patterns drastically reduce the memory usage without sacrificing speed in software implementations. In tests on the Snort pattern set and traces that represent typical NIMS workloads , the Snort performance was enhanced 1.48% -20% compared to other well-known alternatives with an automaton size reduction of 4.86-6.11 compared to the standard AC implementation. The results show that special characteristics of the NIMS can be used into a very effective method to optimize the algorithm design.
其他文献
背景:至今非酒精性脂肪肝的发病机制不十分清楚,而线粒体膜上的解偶联蛋白可使线粒体氧化磷酸化解偶联,导致线粒体合成ATP效率降低,通过能量代谢的改变,参与脂肪肝的发生。目
当今世并经济的发展比以往任何时候都更加依赖于知识的扩散和应用,体现于人力资本和技术中的知识成为经济发展的核心。知识经济使传统的经营理意与经济增长方式发生了巨大变化
叫人怀念的东西越来越多了,比如雪。  在我的印象里,雪是这个世界大地上最辽阔、最庄严、最富有诗意的覆盖物,看到它,便叫我想起“圣诞”“福祉”“天使”……这些韵味很浓的词。  童年时,我的心里飘满了漫天的雪花,比自家里种出的棉花还要多。那时候,大地一片贫穷,穷怕了的孩子就常常想:要是地里头的雪全变成棉花,那该有多好!如今,我们身上都穿上软绵绵的棉花了,而大地,却失去了曾经相濡以沫的覆盖。  那时候,
新华社北京2011年12月23日电国务院总理温家宝23日主持召开国务院常务会议,研究部署加快发展我国下一代互联网产业。会议指出,抓住新形势下技术变革和产业发展的历史机遇,在
旅行可以给人带来欢乐,也可能会对健康造成伤害。遵循以下几点建议,将会帮助你度过一个健康快乐的假期。 Travel can bring happiness to people and can also cause health
目的 探讨肝硬化患者门脉系统血流动力学变化及其与肝脏储备功能Child-Pugh分级的相关性.方法 应用彩色多普勒超声(彩超)检测173例肝炎后肝硬化患者(Child A级61例,B级53例,C级59例)门静脉内径(DPV)、门静脉平均血流速度(VPV)、门静脉血流量(QPV)、脾静脉内径(DSV)、脾静脉平均血流速度(VSV)、脾静脉血流量(QSV),并与正常人进行对比研究.结果 肝硬化患者DP
5月7日,喀左县关工委、喀左县祥华未成年人关爱中心相关人员再次前往锦州,为重度烧伤、正在住院接受治疗的小男孩周少峰又送去4万多元善款。截至目前,喀左县关工委等部门共为
在互联网上,随着各种攻击和入侵事件的不断发生,网络安全越来越成为人们关注的焦点。文章探讨了网络攻击技术以及网络安全的防范技术。 On the Internet, with various atta
中华民族的传统美德,是由道德继承性决定的,是由中华民族传统美德的内容及其特点所决定的,是运管人员进行道德修养及行为规范的必修课。 The traditional virtue of the Chi
《中华魂》杂志2014年7月(上)发表了拙作《竹死不变节,花落有余香》,文中提到了与向警予牺牲有关的涂允檀。经核实,当时涂允檀并非共产党员,说他“叛徒”是不当的,特予更正,