A Faster Pattern Matching Algorithm for Intrusion Detection

Article Preview

Abstract:

In this paper, a Faster algorithm: BMF is proposed, which sets improvements in the time complexity of the BM algorithm. The BMF algorithm defines a new pre-calculation function to increase in the skips of pattern significantly. Experiments indicate that the time complexity is reduced by 63% at most. Therefore, the improved algorithm could provide significant improvement in pattern matching performance when using in an IDS.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 532-533)

Pages:

1414-1418

Citation:

Online since:

June 2012

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Ran Zhang, Depei Qian, and Wenjie Zhang, Overview of intrusion detection technology, Small & Micro Computer System, vol. 24, p.1113–1118, July (2003).

Google Scholar

[2] Lixia Zhang, and Li Chen, An improved Pattern Matching Algorithm, MicroComputer Information, vol. 24, p.68–70, October (2008).

Google Scholar

[3] Shujuan Sun, and Yujing Wang, Research of Pattern Matching Algorithm for Intrusion Detection, Science Technology Information Development and Economy, vol. 17, p.207–208, July (2008).

Google Scholar

[4] Kumar G. Classification and detection of computer intrusion. Purdue University, (1995).

Google Scholar

[5] Danvy O, and Rohde H, On obtaining the Boyer-Moore string-matching algorithm by partial evaluation, Information Processing Letters, vol. 99, pp.158-162, April (2006).

DOI: 10.1016/j.ipl.2006.04.001

Google Scholar

[6] Zhen Liu, Su Xu, Jue Zhang, Improved Algorithm of Pattern Matching for Intrusion Detection, Proceedings of the 2009 International Conference on Multimedia Information Networking and Security, pp.446-449, November (2009).

DOI: 10.1109/mines.2009.175

Google Scholar

[7] Tong Yang, Sisi Wang, Xiangdong Qiao, Qi Chen, Analyze and improvement of BM algorithm, Proceedings of the 5th International Conference of Wireless communications, networking and mobile computing, pp.4558-4561.

DOI: 10.1109/wicom.2009.5302544

Google Scholar