Abstract | ||
---|---|---|
Because of its accuracy, pattern matching technique has recently been applied to Internet security applications such as intrusion detection/prevention, anti-virus, and anti-malware. Among various famous pattern matching algorithms, the Aho-Corasick (AC) can match multiple pattern strings simultaneously with worst-case performance guarantee and is adopted in both Clam antivirus (ClamAV) and Snort intrusion detection open sources. The AC algorithm is based on finite automaton which can be implemented straightforwardly with a two-dimensional state transition table. However, the memory requirement prohibits such an implementation when the total length of the pattern strings is large. The ClamAV implementation limits the depth of the finite automaton and combines with linked lists to reduce memory requirement. The banded-row format is adopted to compress the state transition table and used as an alternative pattern matching machine in Snort. In this paper we present a novel implementation which requires small memory space and achieves high throughput performance. Compared with the banded-row format, our proposed scheme achieves 39.7% reduction in memory requirement for 5,000 patterns randomly selected from ClamAV signatures. Besides, the processing time of our proposed scheme is, on the average, 83.9% of that of the banded-row format for scanning various types of files. Compared with the ClamAV implementation with the same 5,000 patterns and files, our proposed scheme requires slightly more memory space but achieves 80.6% reduction in processing time on the average. |
Year | DOI | Venue |
---|---|---|
2008 | 10.1109/ICCCN.2008.ECP.176 | ICCCN |
Keywords | Field | DocType |
pattern string,aho-corasick algorithm,network security,finite automata,finite automaton,state transition table,pattern matching,computer networks,clam antivirus,telecommunication security,snort intrusion detection,data structures,aho corasick algorithm,intrusion detection,state transition,pediatrics,automata,aho corasick,memory management,algorithm design and analysis,high throughput,throughput,internet security | Data structure,State transition table,Algorithm design,Computer science,Network security,Computer network,Finite-state machine,Memory management,Intrusion detection system,Pattern matching | Conference |
ISSN | ISBN | Citations |
1095-2055 E-ISBN : 978-1-4244-2390-3 | 978-1-4244-2390-3 | 3 |
PageRank | References | Authors |
0.42 | 9 | 2 |
Name | Order | Citations | PageRank |
---|---|---|---|
Tsern-Huei Lee | 1 | 244 | 30.63 |
Nai-Lun Huang | 2 | 5 | 1.48 |