DocumentCode
2113440
Title
Analyze and Improvement of BM Algorithm
Author
Yang Tong ; Wang Si-si ; Qiao Xiang-dong ; Chen Qi
Author_Institution
Telecommun. Eng. Inst., Air force Eng. Univ., Xi´an, China
fYear
2009
fDate
24-26 Sept. 2009
Firstpage
1
Lastpage
4
Abstract
When network is overload, snort spends a lot of time to matching rules. The algorithm determines the performance of intrusion detection system to a large extent. Snort adopts BM algorithm in default, in order to enhance the efficiency of network intrusion detection system which is based on snort, this paper analyzes BM algorithm firstly, and proposes an improved algorithm. Secondly, this thesis compares the two algorithms (BM algorithm and the improved BM algorithm) theoretically, and does a quantitative description of the extent of the improved BM algorithm according to the experimental results. Finally, the improve BM algorithm is applied to the network intrusion detection system, and have achieved good results.
Keywords
security of data; string matching; BM algorithm improvement; Boyer-Moore algorithm; matching rules; network intrusion detection system; overload network; snort network; Algorithm design and analysis; Costs; Educational institutions; Inspection; Intrusion detection; Pattern analysis; Pattern matching; Protocols;
fLanguage
English
Publisher
ieee
Conference_Titel
Wireless Communications, Networking and Mobile Computing, 2009. WiCom '09. 5th International Conference on
Conference_Location
Beijing
Print_ISBN
978-1-4244-3692-7
Electronic_ISBN
978-1-4244-3693-4
Type
conf
DOI
10.1109/WICOM.2009.5302544
Filename
5302544
Link To Document