A memory-based NFA regular expression match engine for signature-based intrusion detection

نویسندگان

  • Derek Chi-Wai Pao
  • Nga Lam Or
  • Ray C. C. Cheung
چکیده

Signature-based intrusion detection is required to inspect network traffic at wire-speed. Matching packet payloads against patterns specified with regular expression is a computation intensive task. Hence, the design of hardware accelerator to speed up regular expression matching has been an active research area. A systematic approach to detect regular expression is based on finite automaton. The space-time trade-off between deterministic finite automaton (DFA) and non-deterministic finite automaton (NFA) is well-known. DFA can offer constant throughput but it may suffer from the state explosion problem. Hence, implementation of DFA for large pattern sets on embedded device with limited on-chip memory may not be viable. NFA requires linear space but the throughput can be very low. Implementations of NFA with hardwired circuits can overcome the speed deficiency by exploiting the massive parallelism offered by dedicated hardware circuitries, but this approach does not support efficient dynamic updates. In this paper, we shall present a memory-based architecture for the implementation of NFA to speed up regular expression matching for signature-based intrusion detection. The proposed method supports dynamic updates and offers constant throughput so that it can be used to supplement the existing DFA-based methods in handling large pattern sets. Two categories of intrusion detection techniques are used in today's intrusion detection system (IDS), namely anomaly detection and signature-based detection. Anomaly detection methods [1] detect attacks by monitoring network traffic behaviors. If the observed traffic behavior deviates significantly from the expect user profile, the IDS may generate an alert and/or take appropriate actions. Anomaly detection can be used to protect the system against unknown attacks. The detection rate is about 98% while the false alarm rate is about 1% [2]. Anomaly detection has two limitations. First, by the time the attack is detected some damages might have been done to the computer system. Anomaly detection can reduce and localize the damages. Second, anomaly detection may not be able to detect slow-attacks where the attacker deliberately slows down the traffic rate of the attack to avoid detection. Signature-based detection methods are based on content inspection. Signature-based detection is precise and accurate, but it has one limitation. The attack patterns have to be known in advance , and are characterized by the intrusion signatures. If an intrusion signature is found in the packet header/payload, the IDS will execute the predefined action, e.g., generates an alert and/or blocks the packet. Pattern matching is a computation intensive task. In …

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

تولید خودکار الگوهای نفوذ جدید با استفاده از طبقه‌بندهای تک کلاسی و روش‌های یادگیری استقرایی

In this paper, we propose an approach for automatic generation of novel intrusion signatures. This approach can be used in the signature-based Network Intrusion Detection Systems (NIDSs) and for the automation of the process of intrusion detection in these systems. In the proposed approach, first, by using several one-class classifiers, the profile of the normal network traffic is established. ...

متن کامل

A Fast Regular Expressions Matching Algorithm for NIDS

In this paper, we propose a new algorithm to accelerate the searching speed in network intrusion detection system (NIDS) and we implement our algorithm in Snort, a popular open-source intrusion detection system. The algorithm is based on the fact that normal data stream rarely matches any virus signature and different packets need to check different keys. The algorithm does not need preprocessi...

متن کامل

Fast and Memory Efficient NFA Pattern Matching using GPU

Network intrusion detection system (NIDS) is mainly designed to monitor the malicious packets spreading on the Internet. With pre-defined virus signatures called patterns, NIDS can find out whether these pre-defined patterns exist in the packet’s payload. GPU can be useful to effectively accelerate pattern matching process due to abundant parallel hardware threads. In this paper, we propose a c...

متن کامل

Fast, memory-efficient regular expression matching with NFA-OBDDs

1389-1286/$ see front matter 2011 Elsevier B.V doi:10.1016/j.comnet.2011.07.002 q This article is a revised and expanded versio appears in the 13th International Symposium on Intrusion Detection (RAID’10) [55]. ⇑ Corresponding author. Tel.: +1 732 445 2001x3 ⇑⇑ Principle corresponding author. Fax: +1 732 445 E-mail addresses: [email protected] (L. Yang edu (R. Karim), [email protected]...

متن کامل

Improving NFA-Based Signature Matching Using Ordered Binary Decision Diagrams

Network intrusion detection systems (NIDS) make extensive use of regular expressions as attack signatures. Internally, NIDS represent and operate these signatures using finite automata. Existing representations of finite automata present a well-known time-space tradeoff: Deterministic automata (DFAs) provide fast matching but are memory intensive, while non-deterministic automata (NFAs) are spa...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Computer Communications

دوره 36  شماره 

صفحات  -

تاریخ انتشار 2013