[go: up one dir, main page]

Shaik et al., 2025 - Google Patents

Energy efficient and high throughput prefix-based pattern matching technique on TCAMs for NIDS

Shaik et al., 2025

Document ID
954825409973183504
Author
Shaik S
Vegesna S
SK N
Publication year
Publication venue
Integration

External Links

Snippet

Abstract Intrusion Detection System (IDS) is a type of packet filtering that ensures network security by analyzing the packets flowing through the network and detecting any malicious pattern (s) present in them. In signature-based NIDS, pattern matching is the critical step as it …
Continue reading at www.sciencedirect.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30943Information retrieval; Database structures therefor; File system structures therefor details of database functions independent of the retrieved data type
    • G06F17/30964Querying
    • G06F17/30979Query processing
    • G06F17/30985Query processing by using string matching techniques
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30943Information retrieval; Database structures therefor; File system structures therefor details of database functions independent of the retrieved data type
    • G06F17/30946Information retrieval; Database structures therefor; File system structures therefor details of database functions independent of the retrieved data type indexing structures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/74Address processing for routing
    • H04L45/745Address table lookup or address filtering
    • H04L45/7453Address table lookup or address filtering using hashing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies

Similar Documents

Publication Publication Date Title
US20220237128A1 (en) Content search extension architecture for programmable intelligent search memory
Yu et al. Gigabit rate packet pattern-matching using TCAM
Becchi et al. An improved algorithm to accelerate regular expression evaluation
US7831606B2 (en) Signature search architecture for programmable intelligent search memory
US9129043B2 (en) 100GBPS security and search architecture using programmable intelligent search memory
Alicherry et al. High speed pattern matching for network IDS/IPS
Dharmapurikar et al. Fast and scalable pattern matching for content filtering
Le et al. A memory-efficient and modular approach for large-scale string pattern matching
US20110029549A1 (en) Signature search architecture for programmable intelligent search memory
US8272056B2 (en) Efficient intrusion detection
Xu et al. A multi-dimensional progressive perfect hashing for high-speed string matching
Karimov et al. Application of the Aho-Corasick algorithm to create a network intrusion detection system
Fide et al. A survey of string matching approaches in hardware
Guinde et al. Efficient hardware support for pattern matching in network intrusion detection
Shaik et al. Energy efficient and high throughput prefix-based pattern matching technique on TCAMs for NIDS
Tashev et al. Comparative performance analysis the Aho-Corasick algorithm for developing a network detection system
Xu et al. Recursive shift indexing: a fast multi-pattern string matching Algorithm
Shaik et al. A High Throughput Bloom Filter Based TCAM Architecture for Fast NIDS
Tashev et al. Application of the Aho-Corasick algorithm to create a network intrusion detection system
Liu et al. FTSE: The FNIP-like TCAM searching engine
Chang et al. Multi-character processor array for pattern matching in network intrusion detection system
Huang et al. Accelerating the bit-split string matching algorithm using Bloom filters
Huang et al. A power-efficient approach to TCAM-based regular expression matching
Zhang et al. XWM: a high-speed matching algorithm for large-scale URL rules in wireless surveillance applications
Chang et al. Improved TCAM-based pre-filtering for network intrusion detection systems