期刊文献+

一种面向入侵检测的改进AC算法 被引量:9

An Improved AC Algorithm for Intrusion Detection
下载PDF
导出
摘要 在研究入侵检测系统中AC算法应用3的基础上,提出一种改进的AC算法——双重压缩AC算法.在算法中设计了新的AC状态自动机存储空间压缩方法,并给出与之对应的匹配流程.在Snort中进行测试,测试结果显示双重压缩AC算法的空间和时间性能比基本AC算法分别提升了52.2%和73.5%. On the basis of analyzing AC algorithm in IDS,this paper presents an improved AC algorithm named double compression AC algorithm (DCAC),describes it's new state automaton storage compression and corresponding matching process. DCAC has been tested in Snort. The results show that DCAC can averagely enhance the performance of Snort by 52.2% in terms of memory usage and by 73.5% in terms of processing time compared to the standard AC algorithm.
作者 徐红 秦志光
出处 《微电子学与计算机》 CSCD 北大核心 2010年第11期109-112,共4页 Microelectronics & Computer
关键词 入侵检测 模式匹配 AC算法 intrusion detection system pattern matching Aho-Corasick (AC) algorithm
  • 相关文献

参考文献6

  • 1Tuck N, Sherwood T, Calder B, et al. Deterministic memory - efficient string matching algorithms for intrusion detection[C]//Proc, of the IEEE INFOCOM conference. Hong Kong, China: Institute of electrical engineers inc., 2004 : 333 - 340.
  • 2卢汪节,鞠时光.入侵检测系统中一种改进的AC算法[J].计算机工程与应用,2006,42(15):146-148. 被引量:6
  • 3余建明,薛一波,李军.Memory Efficient String Matching Algorithm for Network Intrusion Management System[J].Tsinghua Science and Technology,2007,12(5):585-593. 被引量:9
  • 4Alfred V Aho, Margaret J Corasik. Efficient string matching:an aid to bibliographic search[J]. Communications of the ACM, 1975,18(6) :333 - 340.
  • 5Norton M. Optimizing pattem matching for intrusion detection[EB/OL]. [2004- 12- 10]. http://www. NIDSrezearch. org.
  • 6Martin Roesch. Snort user manual[ EB/OL]. [ 2008 - 08 - 28 ]. http://www. snort. org/docs/snort-htmanuals/htmanual-282/.

二级参考文献17

  • 1Security of the Internet,http://www.cert.org
  • 2Sandeep Kumar.Classification and Detection of Computer Intrusions[R].COAST Laboratory Purdue University,Technical Report,1995
  • 3Alfred V Aho,Margaret J Corasik.Efficient String Matching:An Aid to Bibliographic[J].Bell Labs,Communications of the ACM, 1975,18(6)
  • 4Nathan Tuck ,Timothy Sherwood ,Brad Calder.Deterministic Memory Efficient String Matching Algorithms for Intrusion Detection.http://www.cs.ucsd.edu,2003
  • 5"Snort.org ".http ://www.snort.org/
  • 6DEFCON .http://www.shmoo.com/cctf/
  • 7R Boyer,J Moore.A fast string searching algorithm[J].Commun,1977;20(10):762-772
  • 8Cowan C,Arnold S,Beattie S,Wright C,Viega J.DEF- CON capture the flag: Defending vulnerable code form in- tense attack[].Proceedings of the DARPA DISCEX III Conference.2003
  • 9E2xB algorithm patch for Snort version 2.4.2. http://dcs.ics.forth.gr/Activities/Projects/snort.html . 2005
  • 10Wu S,Manber U.A fast algorithm for multi-pattern searching[].Technical Report TR-- University of Arizona.1994

共引文献11

同被引文献86

引证文献9

二级引证文献40

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部