Lin et al., 2008 - Google Patents
Using string matching for deep packet inspectionLin et al., 2008
View PDF- Document ID
- 14704640518795416579
- Author
- Lin P
- Lin Y
- Lai Y
- Lee T
- Publication year
- Publication venue
- Computer
External Links
Snippet
String matching has sparked renewed research interest due to its usefulness for deep packet inspection in applications such as intrusion detection, virus scanning, and Internet content filtering. Matching expressive pattern specifications with a scalable and efficient …
- 238000007689 inspection 0 title abstract description 11
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30943—Information retrieval; Database structures therefor; File system structures therefor details of database functions independent of the retrieved data type
- G06F17/30964—Querying
- G06F17/30979—Query processing
- G06F17/30985—Query processing by using string matching techniques
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30943—Information retrieval; Database structures therefor; File system structures therefor details of database functions independent of the retrieved data type
- G06F17/30946—Information retrieval; Database structures therefor; File system structures therefor details of database functions independent of the retrieved data type indexing structures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
- G06F17/30386—Retrieval requests
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3061—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F17/30613—Indexing
- G06F17/30619—Indexing indexing structures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/74—Address processing for routing
- H04L45/745—Address table lookup or address filtering
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Lin et al. | Using string matching for deep packet inspection | |
Xu et al. | A survey on regular expression matching for deep packet inspection: Applications, algorithms, and hardware platforms | |
US7805460B2 (en) | Generating a hierarchical data structure associated with a plurality of known arbitrary-length bit strings used for detecting whether an arbitrary-length bit string input matches one of a plurality of known arbitrary-length bit string | |
Becchi et al. | A hybrid finite automaton for practical deep packet inspection | |
Dharmapurikar et al. | Fast and scalable pattern matching for content filtering | |
Ficara et al. | An improved DFA for fast regular expression matching | |
Becchi et al. | A-DFA: A time-and space-efficient DFA compression algorithm for fast regular expression evaluation | |
US8866644B2 (en) | Detecting whether an arbitrary-length bit string input matches one of a plurality of known arbitrary-length bit strings using a hierarchical data structure | |
Clark et al. | Design of efficient FPGA circuits for matching complex patterns in network intrusion detection systems | |
US8010481B2 (en) | Pattern matching technique for high throughput network processing | |
Le et al. | A memory-efficient and modular approach for large-scale string pattern matching | |
KR20140051914A (en) | Compiler for regular expressions | |
KR20140061359A (en) | Anchored patterns | |
Bremler-Barr et al. | CompactDFA: Scalable pattern matching using longest prefix match solutions | |
Najam et al. | Speculative parallel pattern matching using stride-k DFA for deep packet inspection | |
Xu et al. | A multi-dimensional progressive perfect hashing for high-speed string matching | |
Bremler-Barr et al. | CompactDFA: Generic state machine compression for scalable pattern matching | |
Wang et al. | Memory-based architecture for multicharacter Aho–Corasick string matching | |
Pao et al. | A memory-based NFA regular expression match engine for signature-based intrusion detection | |
Aldwairi et al. | n‐Grams exclusion and inclusion filter for intrusion detection in Internet of Energy big data systems | |
Weng et al. | Deep packet pre-filtering and finite state encoding for adaptive intrusion detection system | |
Wang et al. | Strifa: Stride finite automata for high-speed regular expression matching in network intrusion detection systems | |
Erdem | Tree-based string pattern matching on FPGAs | |
Artan et al. | Tribica: Trie bitmap content analyzer for high-speed network intrusion detection | |
Vespa et al. | Deterministic finite automata characterization and optimization for scalable pattern matching |