Study on Computer Virus Search System Based on Content Addressable Memory

Article Preview

Abstract:

The structure, characteristics and use of MCM69C432 are introduced in the paper, based upon which a virus search scheme is proposed aiming at its characteristics. Through constructing CAM rule matching unit, the package head and data load are filtered parallelly, and the filtered results are handled centralizely according to the rule response requirements. It makes the system more powerful in processing and applicability, which has a good application prospect.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 171-172)

Pages:

580-583

Citation:

Online since:

December 2010

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2011 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Motorola Inc . MCM69C432 Data Sheet . (2001).

Google Scholar

[2] Lei Ming, Mao Zhanggen. DATA-search based upon CAM of MCM 69C232, J. Microcomputer applications , pp.125-128, January (2005).

Google Scholar

[3] Zhang Yin, Zhao Xiaomin, Chen Qingzhang . The design and implementation of computer virus database and information management platform, J. Computer Engineering and Applications, pp.130-131, July (2005).

Google Scholar

[4] Tuck N, Sherwood T, Calder B, et al. Deterministic Memory- efficient String Matching Algorithms for Intrusion Detection, [C]/Proc. of the 23rd IEEE Infocom. Hong Kong, China: [s. n. ], pp.333-340, (2004).

DOI: 10.1109/infcom.2004.1354682

Google Scholar

[5] Luo Huiqian, Liu Kai. A Firewall System Based on Content-Addressable Memory and ARM, J. Computer Security, pp.36-38, May (2008).

Google Scholar

[6] Luo Huiqian, Liu Kai. Content-addressable memory MCM69C432 and its application in fire-wall, J. Electronic instrumentation customer, vol. 15, p.76~77, May (2008).

Google Scholar

[7] Xie Wenliang, Yang Chuangxin, Yun Jun. A Comparison Study on Software and Hardware implementation of Packet Classifi cation Using Snort Rules, J. Netinfo Security, pp.46-48, September (2009).

Google Scholar