Title
An Efficient and Scalable Pattern Matching Scheme for Network Security Applications
Abstract
Because of its accuracy, pattern matching technique has recently been applied to Internet security applications such as intrusion detection/prevention, anti-virus, and anti-malware. Among various famous pattern matching algorithms, the Aho-Corasick (AC) can match multiple pattern strings simultaneously with worst-case performance guarantee and is adopted in both Clam antivirus (ClamAV) and Snort intrusion detection open sources. The AC algorithm is based on finite automaton which can be implemented straightforwardly with a two-dimensional state transition table. However, the memory requirement prohibits such an implementation when the total length of the pattern strings is large. The ClamAV implementation limits the depth of the finite automaton and combines with linked lists to reduce memory requirement. The banded-row format is adopted to compress the state transition table and used as an alternative pattern matching machine in Snort. In this paper we present a novel implementation which requires small memory space and achieves high throughput performance. Compared with the banded-row format, our proposed scheme achieves 39.7% reduction in memory requirement for 5,000 patterns randomly selected from ClamAV signatures. Besides, the processing time of our proposed scheme is, on the average, 83.9% of that of the banded-row format for scanning various types of files. Compared with the ClamAV implementation with the same 5,000 patterns and files, our proposed scheme requires slightly more memory space but achieves 80.6% reduction in processing time on the average.
Year
DOI
Venue
2008
10.1109/ICCCN.2008.ECP.176
ICCCN
Keywords
Field
DocType
pattern string,aho-corasick algorithm,network security,finite automata,finite automaton,state transition table,pattern matching,computer networks,clam antivirus,telecommunication security,snort intrusion detection,data structures,aho corasick algorithm,intrusion detection,state transition,pediatrics,automata,aho corasick,memory management,algorithm design and analysis,high throughput,throughput,internet security
Data structure,State transition table,Algorithm design,Computer science,Network security,Computer network,Finite-state machine,Memory management,Intrusion detection system,Pattern matching
Conference
ISSN
ISBN
Citations 
1095-2055 E-ISBN : 978-1-4244-2390-3
978-1-4244-2390-3
3
PageRank 
References 
Authors
0.42
9
2
Name
Order
Citations
PageRank
Tsern-Huei Lee124430.63
Nai-Lun Huang251.48