DocumentCode :
3378206
Title :
An Efficient and Scalable Pattern Matching Scheme for Network Security Applications
Author :
Lee, Tsern-Huei ; Huang, Nai-Lun
Author_Institution :
Dept. of Commun. Eng., Nat. Chiao Tung Univ., Hsinchu
fYear :
2008
fDate :
3-7 Aug. 2008
Firstpage :
1
Lastpage :
7
Abstract :
Because of its accuracy, pattern matching technique has recently been applied to Internet security applications such as intrusion detection/prevention, anti-virus, and anti-malware. Among various famous pattern matching algorithms, the Aho-Corasick (AC) can match multiple pattern strings simultaneously with worst-case performance guarantee and is adopted in both Clam antivirus (ClamAV) and Snort intrusion detection open sources. The AC algorithm is based on finite automaton which can be implemented straightforwardly with a two-dimensional state transition table. However, the memory requirement prohibits such an implementation when the total length of the pattern strings is large. The ClamAV implementation limits the depth of the finite automaton and combines with linked lists to reduce memory requirement. The banded-row format is adopted to compress the state transition table and used as an alternative pattern matching machine in Snort. In this paper we present a novel implementation which requires small memory space and achieves high throughput performance. Compared with the banded-row format, our proposed scheme achieves 39.7% reduction in memory requirement for 5,000 patterns randomly selected from ClamAV signatures. Besides, the processing time of our proposed scheme is, on the average, 83.9% of that of the banded-row format for scanning various types of files. Compared with the ClamAV implementation with the same 5,000 patterns and files, our proposed scheme requires slightly more memory space but achieves 80.6% reduction in processing time on the average.
Keywords :
computer networks; finite automata; pattern matching; telecommunication security; Aho-Corasick algorithm; Clam antivirus; Snort intrusion detection; finite automaton; network security; pattern matching; pattern string; state transition table; Automata; Data structures; IP networks; Information retrieval; Information security; Internet; Intrusion detection; National security; Pattern matching; Throughput;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Communications and Networks, 2008. ICCCN '08. Proceedings of 17th International Conference on
Conference_Location :
St. Thomas, US Virgin Islands
ISSN :
1095-2055
Print_ISBN :
978-1-4244-2389-7
Electronic_ISBN :
1095-2055
Type :
conf
DOI :
10.1109/ICCCN.2008.ECP.176
Filename :
4674335
Link To Document :
بازگشت