An Improved Algorithm Based on AC-BM Algorithm

Article Preview

Abstract:

The pattern matching algorithm is the mainstream technology in the instruction detection system, and therefore as a pattern-matching methods core string matching algorithm directly affect an intrusion detection system performance and efficiency. So based on the discussions of the most fashionable pattern matching algorithms at present, an improved algorithm of AC-BM is presented. From the experiments in the Snort ,it is concluded that the improved algorithm of the performance and efficiency is higher than AC-BM algorithm.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1576-1579

Citation:

Online since:

August 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Zhuo Ning, Jian Gong, in: WDawgMatch: An Accurate Mult-i Pattern Matching Algorithm in Intrusion Detection Systems, edited by Computer engineering and Science, 2010, 32(8): 17-21.

Google Scholar

[2] Zhang Guoping, Xu Wendong, in: Improved matching algorithm of string pattern [J], edited by Computer Engineering and Design [J], 2009, 28 (20): 4881-4884.

Google Scholar

[3] Shisong Xiao, Chuanfen Zheng, in: A New Fast Patter Matching Algorithm, 14th Youth Conference on Communication, 2009, pp.436-439.

Google Scholar

[4] Liu Shengfei, Zhang Yunquan, in: Improved Pattern MatchingAlgorithm of BMH [J], edited by Computer Science, 2008, 35 (11): 164-165.

Google Scholar

[5] Chao Guan , Jianzhong Jiang, Guo Junli, An algorithm based on multiple patterns match algorithm-deterministic finite state automata[J],. Computer Engineering, 2010, 36(1): 208-210.

Google Scholar

[6] Wu Xihong, in: Anatomy of BM pattern matching algorithm [J], edited by Computer Engineering and Design, 2007, 1 (1): 29-31.

Google Scholar

[7] YuebinBai, Hidetsune Kobayashi. Intrusion Detection Systems: Technology and Development[A],. Proceedings of the 17th International conference on Advanced Information Networking and Applications[C]. Oakland: IEEE Computer Press, (2003).

DOI: 10.1109/aina.2003.1192972

Google Scholar

[8] 1999 DARPA Intrusion Detection Evaluation Data Sets. http: /www. ll. mit. edu/IST.

Google Scholar