Design and Implementation of NIDS String Matching Based on SOPC

Article Preview

Abstract:

String matching is a key problem in many network processing applications. Current implementations of this process using software are time consuming. This paper presents a string matching system that based on FPGA. This paper uses DM9000A to receive network data and uses Snort rule and HashMem function to match pattern. With software simulation the conflict pattern of Snort rules found out and processed separately. In the system, conflict can be high-speed solved. With the PC handle string matching that more than 16 Byte, the FPGA processing speed has improved greatly .The experimental results show that the system throughput is 1.22Gbps, more than 20 times of the software method. When processing more Snort rules system throughput is not affected. Experimental results show that the system can quickly adapt to the demand for hardware reconfiguration and meet the network application requirements.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 424-425)

Pages:

551-554

Citation:

Online since:

January 2012

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] J. Allen, A. Christie, W. Fithen, I. McHugh, J. Pickel, and E. Stoneu, "State of the Practice of Intrusion Detection Technologies" , Technical R eport CMUISEI-99-TR-028, 1999.

DOI: 10.21236/ada375846

Google Scholar

[2] L.G. Roberts, "Beyond Moore's Law: Internet Growth Trends", IEEE Computer, Jan 2000: 117-119.

Google Scholar

[3] Man: Necker, Didier Contis, and David Schimmel, "TCP- Stream Reassembly and State Tracking in Hardware", Proceedings oJFCCM 2002: 286-287.

DOI: 10.1109/fpga.2002.1106687

Google Scholar

[4] James Moscola, John Lockwood, Ronald P. Loui, and Michael Pachos, "Implementation of a Content-Scanning Module for Internet Firewall", proceedings of IEEE FCCM 2003,April.

DOI: 10.1109/fpga.2003.1227239

Google Scholar

[5] SNORT: The Open Source Network Intrusion Detection System. http://www.snort.org.

Google Scholar

[6] Tran Ngoc Thinh; Kittitornkun, S.; Tomiyama, S. "Applying Cuckoo Hashing for FPGA-based Pattern Matching in NIDS/NIPS", Field-Programmable Technology, 2007. ICFPT2007. International Conference on, 12-14 Dec. 2007:121 – 128.

DOI: 10.1109/fpt.2007.4439240

Google Scholar

[7] Janardhan Singaraju, John A. Chandy. "FPGA based string matching for network processing applications", Microprocessors and Microsystems 32 (2008): 210–222.

DOI: 10.1016/j.micpro.2007.11.001

Google Scholar