Title :
A retargetable multiple string matching code generation for embedded network intrusion detection platforms
Author :
Chia-Nan Kao; I-Ju Liao; Yung-Cheng Chang; Che-Wei Lin; Nen-Fu Huang; Rong-Tai Liu; Hsien-Wei Hung
Author_Institution :
Network Threat Defense Technol. Group, Nat. Tsing Hua Univ., Hsinchu, Taiwan
fDate :
6/1/2015 12:00:00 AM
Abstract :
The common means of defense for network security systems is to block the intrusions by matching the signatures. Intrusion-signature matching is the critical operation. However, small and medium-sized enterprise (SME) or Small Office Home Office (SOHO) network security systems may not have sufficient resources to maintain good matching performance with full-set rules. Code generation is a technique used to convert data structures or instruction to other forms to obtain greater benefits within execution environments. This study analyzes intrusion detection system (IDS) signatures and discovers character occurrence to be significantly uneven. Based on this property, this study designs a method to generate a string matching source code according to the state table of AC algorithm for embedded network intrusion detection platforms. The generated source code requires less memory and relies not only on table lookup, but also on the ability of processor. This method can upgrade the performance by compiling optimization and contribute to the application of network processors and DSP-like based platforms. From evaluation, this method requires use of only 20% memory and can achieve 86% performance in clean traffic compared to the original Aho-Corasick algorithm (AC).
Keywords :
"Switches","Thyristors","Memory management","Intrusion detection","Optimization","Table lookup","Arrays"
Conference_Titel :
Communication Software and Networks (ICCSN), 2015 IEEE International Conference on
Print_ISBN :
978-1-4799-1983-3
DOI :
10.1109/ICCSN.2015.7296134