Back to Search Start Over

Exploration of Hardware Architectures for String Matching Algorithms in Network Intrusion Detection Systems

Authors :
Muhammad Rashid
Malik Imran
Atif Raza Jafri
Source :
IAIT
Publication Year :
2020
Publisher :
ACM, 2020.

Abstract

An intrusion detection system monitors and analyzes all the incoming packets, on a given network, to detect any corresponding vulnerabilities and intrusions. It consists of four major modules: packet capturing, packet decoding, packet preprocessing and string/pattern matching. Among these, the string matching is computationally the most intensive part and a number of hardware architectures/designs have already been proposed to accelerate its performance. Consequently, an exploration of existing hardware architectures for string matching algorithms is critical. This paper identifies the most frequently used string matching algorithms and techniques, utilized for the hardware implementation. Subsequently, an exploration of various hardware architectures is provided for the identified algorithms and techniques. Finally, the implementation details of explored architectures are discussed in terms of the used device, consumed hardware resources, operational clock frequency and throughput.

Details

Database :
OpenAIRE
Journal :
Proceedings of the 11th International Conference on Advances in Information Technology
Accession number :
edsair.doi...........894277bbb92b7c35459ca4d225b1d9ba
Full Text :
https://doi.org/10.1145/3406601.3406608