Comparison of stringmatching algorithms: an aid to information content security

AN Du, BX Fang, XC Yun, MZ Hu… - Proceedings of the …, 2003 - ieeexplore.ieee.org
We analyzed the core ideas of three basic string matching algorithms (KMP, BM, DFA),
described the principles of five advanced online multi-pattern matching algorithms (AC …

Application level IDS using protocol analysis

KV Rajkumar, V Vaidehi, S Pradeep… - 2007 International …, 2007 - ieeexplore.ieee.org
As network attacks have increased in number and severity over the past few years, intrusion
detection systems have become a necessary addition to the security infrastructure of most …

Approximate fingerprinting to accelerate pattern matching

R Ramaswamy, L Kencl, G Iannaccone - Proceedings of the 6th ACM …, 2006 - dl.acm.org
Pattern matching and analysis over network data streams is increasingly becoming an
essential primitive of network monitoring systems. It is a fundamental part of most intrusion …

A software implementation and evaluation for searching and extracting information of application layer from network traffic

SI Ishida, S Harashima, H Nishi, M Koibuchi… - Computer …, 2012 - keio.elsevierpure.com
抄録 Recently, new network services in the Internet have been proposed and studied, which
use special information obtained from a router or a gateway. Although Layer-7 inspection …

A novel algorithm for pattern matching with back references

L Yang, V Ganapathy, P Manadhata… - 2015 IEEE 34th …, 2015 - ieeexplore.ieee.org
Modern network security applications, such as network-based intrusion detection systems
(NIDS) and firewalls, routinely employ deep packet inspection to identify malicious traffic. In …

A new compression method for compressed matching

ST Klein, D Shapira - Proceedings DCC 2000. Data …, 2000 - ieeexplore.ieee.org
A new compression method for compressed matching Page 1 A New Compression Method
for Compressed Matching EXTENDED ABSTRACT Shmuel T. Klein Dept. of Math. & CS Bar …

[PDF][PDF] High performance pattern matching algorithm for network security

Y Wang, H Kobayashi - IJCSNS, 2006 - Citeseer
Many network security applications rely on pattern matching to extract the threat from
network traffic. The increase in network speed and traffic may make existing algorithms to …

Multiple pattern matching in LZW compressed text

T Kida, M Takeda, A Shinohara… - Proceedings DCC'98 …, 1998 - ieeexplore.ieee.org
We address the problem of searching in LZW compressed text directly, and present a new
algorithm for finding multiple patterns by simulating the move of the Aho-Corasick (1975) …

{DFC}: Accelerating string pattern matching for network applications

B Choi, J Chae, M Jamshed, K Park… - 13th USENIX Symposium …, 2016 - usenix.org
Middlebox services that inspect packet payloads have become commonplace. Today,
anyone can sign up for cloudbased Web application firewall with a single click. These …

Hierarchical multi-pattern matching algorithm for network content inspection

TF Sheu, NF Huang, HP Lee - Information Sciences, 2008 - Elsevier
Inspection engines that can inspect network content for application-layer information are
urgently required. In-depth packet inspection engines, which search the whole packet …