An Efficient and Scalable Pattern Matching Scheme for Network Security Applications
description
Transcript of An Efficient and Scalable Pattern Matching Scheme for Network Security Applications
![Page 1: An Efficient and Scalable Pattern Matching Scheme for Network Security Applications](https://reader030.fdocuments.in/reader030/viewer/2022020717/56814d08550346895dba3c18/html5/thumbnails/1.jpg)
An Efficient and Scalable Pattern Matching Scheme for Network
Security Applications
Department of Computer Science and Information Engineering National Cheng Kung University, Taiwan R.O.C.
Authors: Tsern-Huei Lee; Nai-Lun HuangPublisher: Computer Communications and Networks, 2008. ICCCN '08. Proceedings of 17th International Conference on3-7 Aug. 2008 Page(s)1 - 7 Present: Chia-Ming ,Chang Date: 3, 4, 2009
1
![Page 2: An Efficient and Scalable Pattern Matching Scheme for Network Security Applications](https://reader030.fdocuments.in/reader030/viewer/2022020717/56814d08550346895dba3c18/html5/thumbnails/2.jpg)
Outline 1. Introduction 2. Architecture 3. Experimental results 4. Conclusion
2
![Page 3: An Efficient and Scalable Pattern Matching Scheme for Network Security Applications](https://reader030.fdocuments.in/reader030/viewer/2022020717/56814d08550346895dba3c18/html5/thumbnails/3.jpg)
Introduction (1/3)
3
![Page 4: An Efficient and Scalable Pattern Matching Scheme for Network Security Applications](https://reader030.fdocuments.in/reader030/viewer/2022020717/56814d08550346895dba3c18/html5/thumbnails/4.jpg)
Introduction (2/3)
4
![Page 5: An Efficient and Scalable Pattern Matching Scheme for Network Security Applications](https://reader030.fdocuments.in/reader030/viewer/2022020717/56814d08550346895dba3c18/html5/thumbnails/5.jpg)
Introduction (3/3)
5
![Page 6: An Efficient and Scalable Pattern Matching Scheme for Network Security Applications](https://reader030.fdocuments.in/reader030/viewer/2022020717/56814d08550346895dba3c18/html5/thumbnails/6.jpg)
Outline 1. Introduction 2. Architecture 3. Experimental results 4. Conclusion
6
![Page 7: An Efficient and Scalable Pattern Matching Scheme for Network Security Applications](https://reader030.fdocuments.in/reader030/viewer/2022020717/56814d08550346895dba3c18/html5/thumbnails/7.jpg)
Architecture (1/3) Σ= {a, b, c, d, e, f, g, h} Σ are sequentially encoded as 0, 1, 2, 3, 4, 5,6 and 7
Y= {abcda (0), abba (1), cda (2), cabc (3)}.
7
![Page 8: An Efficient and Scalable Pattern Matching Scheme for Network Security Applications](https://reader030.fdocuments.in/reader030/viewer/2022020717/56814d08550346895dba3c18/html5/thumbnails/8.jpg)
Architecture (2/3)
8
![Page 9: An Efficient and Scalable Pattern Matching Scheme for Network Security Applications](https://reader030.fdocuments.in/reader030/viewer/2022020717/56814d08550346895dba3c18/html5/thumbnails/9.jpg)
Architecture (3/3)
9
![Page 10: An Efficient and Scalable Pattern Matching Scheme for Network Security Applications](https://reader030.fdocuments.in/reader030/viewer/2022020717/56814d08550346895dba3c18/html5/thumbnails/10.jpg)
Outline 1. Introduction 2. Architecture 3. Experimental results 4. Conclusion
10
![Page 11: An Efficient and Scalable Pattern Matching Scheme for Network Security Applications](https://reader030.fdocuments.in/reader030/viewer/2022020717/56814d08550346895dba3c18/html5/thumbnails/11.jpg)
Experimental results (1/3)
11
![Page 12: An Efficient and Scalable Pattern Matching Scheme for Network Security Applications](https://reader030.fdocuments.in/reader030/viewer/2022020717/56814d08550346895dba3c18/html5/thumbnails/12.jpg)
Experimental results (2/3)
12
![Page 13: An Efficient and Scalable Pattern Matching Scheme for Network Security Applications](https://reader030.fdocuments.in/reader030/viewer/2022020717/56814d08550346895dba3c18/html5/thumbnails/13.jpg)
Experimental results (3/3)
13
![Page 14: An Efficient and Scalable Pattern Matching Scheme for Network Security Applications](https://reader030.fdocuments.in/reader030/viewer/2022020717/56814d08550346895dba3c18/html5/thumbnails/14.jpg)
Outline 1. Introduction 2. Architecture 3. Experimental results 4. Conclusion
14
![Page 15: An Efficient and Scalable Pattern Matching Scheme for Network Security Applications](https://reader030.fdocuments.in/reader030/viewer/2022020717/56814d08550346895dba3c18/html5/thumbnails/15.jpg)
Conclusion (1/1)
15
we first present an idea to improve the throughput performance of the banded-row format AC and then propose a scalable implementation of the Aho-Corasick pattern matching algorithm.
our proposed implementation achieves 39.7% reduction in memory requirement for 5,000 pattern strings randomly selected from ClamAV signatures and 16.1% reduction in processing time on the average for scanning various types of files.