Back to Search
Start Over
Exploration of Hardware Architectures for String Matching Algorithms in Network Intrusion Detection Systems
- Source :
- IAIT
- Publication Year :
- 2020
- Publisher :
- ACM, 2020.
-
Abstract
- An intrusion detection system monitors and analyzes all the incoming packets, on a given network, to detect any corresponding vulnerabilities and intrusions. It consists of four major modules: packet capturing, packet decoding, packet preprocessing and string/pattern matching. Among these, the string matching is computationally the most intensive part and a number of hardware architectures/designs have already been proposed to accelerate its performance. Consequently, an exploration of existing hardware architectures for string matching algorithms is critical. This paper identifies the most frequently used string matching algorithms and techniques, utilized for the hardware implementation. Subsequently, an exploration of various hardware architectures is provided for the identified algorithms and techniques. Finally, the implementation details of explored architectures are discussed in terms of the used device, consumed hardware resources, operational clock frequency and throughput.
- Subjects :
- Computer science
Network packet
business.industry
Clock rate
String (computer science)
Throughput
02 engineering and technology
String searching algorithm
Intrusion detection system
020202 computer hardware & architecture
0202 electrical engineering, electronic engineering, information engineering
020201 artificial intelligence & image processing
Pattern matching
business
Decoding methods
Computer hardware
Subjects
Details
- Database :
- OpenAIRE
- Journal :
- Proceedings of the 11th International Conference on Advances in Information Technology
- Accession number :
- edsair.doi...........894277bbb92b7c35459ca4d225b1d9ba
- Full Text :
- https://doi.org/10.1145/3406601.3406608