Research on Asynchronous Parallel Finite Automaton in DPI Based on Cloud Computing

Article Preview

Abstract:

We propose a new deep packet inspection mechanism: APFA(Asynchronous Parallel Finite Automaton) instead of the traditional one, which is developed based on detailed analysis over causes of status explosion and flaws of existing solutions. Applying Asynchronous Parallelism and Heuristically Forecast Mechanism, it can take advantage of multi-core platform, offering an effective method to avoid overlapping problem and semantic assaults. Experiments under environment with artificial flows show that the average space APFA occupies is 89.7% less than that of DFA and the average time is 24.4% less cost.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2774-2777

Citation:

Online since:

September 2013

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] S. Roschke, C. Feng, C. Meinel, Intrusion Detection in the Cloud". Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing, DASC , 09, pp.729-734, 12-14 Dec. (2009).

DOI: 10.1109/dasc.2009.94

Google Scholar

[2] A.V. Dastjerdi, K.A. Bakar, S.G.H. Tabatabaei, Distributed Intrusion Detection in Clouds Using Mobile Agents". Third International Conference on Advanced Engineering Computing and Applications in Sciences, ADVCOMP , 09. pp.175-180, 11-16 Oct. (2009).

DOI: 10.1109/advcomp.2009.34

Google Scholar

[3] K Vieira, A. Schulter, C. Westphall, Intrusion Detection Techniques in Grid and Cloud Computing Environment,. IT Professional , Sep. (2009).

Google Scholar

[4] R. Smith et al., Deflating the Big Bang: Fast and Scalable Deep Packet Inspection with Extended Finit Automata, SIGCOMM 2008 Aug, ACM.

DOI: 10.1145/1402958.1402983

Google Scholar

[5] P.C. Lin, Y.D. Lin and Y.C. Lai, Using String Matching for Deep Packet Inspection, computer practices, April 2008, pp.23-28.

DOI: 10.1109/mc.2008.138

Google Scholar

[6] A. Bakshi, B. Yogesh, Securing Cloud from DDOS Attacks Using Intrusion Detection System in Virtual Machine". Second International Conference on Communication Software and Networks, ICCSN , 10. pp.260-264, 26-28 Feb. (2010).

DOI: 10.1109/iccsn.2010.56

Google Scholar

[7] J. Youngmin, C. Mokdong, Adaptive security management model in the cloud computing environment,. The 12th International Conference on Advanced Communication Technology (ICACT), pp.1664-1669, 7-10 Feb. (2010).

Google Scholar

[8] W. Cong, W. Qian, R. Kui, L. Wenjing, Ensuring data storage security in Cloud Computing,. 17th International Workshop on Quality of Service, IWQoS, pp.1-9, 13-15 July (2009).

DOI: 10.1109/iwqos.2009.5201385

Google Scholar