Notification: Our email services are now fully restored after a brief, temporary outage caused by a denial-of-service (DoS) attack. If you sent an email on Dec 6 and haven't received a response, please resend your email.
CFP last date
20 December 2024
Reseach Article

Feasible Study on Pattern Matching Algorithms based on Intrusion Detection Systems

by Saurabh Tiwari, Deepak Motwani
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 96 - Number 20
Year of Publication: 2014
Authors: Saurabh Tiwari, Deepak Motwani
10.5120/16909-6989

Saurabh Tiwari, Deepak Motwani . Feasible Study on Pattern Matching Algorithms based on Intrusion Detection Systems. International Journal of Computer Applications. 96, 20 ( June 2014), 13-17. DOI=10.5120/16909-6989

@article{ 10.5120/16909-6989,
author = { Saurabh Tiwari, Deepak Motwani },
title = { Feasible Study on Pattern Matching Algorithms based on Intrusion Detection Systems },
journal = { International Journal of Computer Applications },
issue_date = { June 2014 },
volume = { 96 },
number = { 20 },
month = { June },
year = { 2014 },
issn = { 0975-8887 },
pages = { 13-17 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume96/number20/16909-6989/ },
doi = { 10.5120/16909-6989 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:22:16.159765+05:30
%A Saurabh Tiwari
%A Deepak Motwani
%T Feasible Study on Pattern Matching Algorithms based on Intrusion Detection Systems
%J International Journal of Computer Applications
%@ 0975-8887
%V 96
%N 20
%P 13-17
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

With the increasing popularity of web services, attackers are paying more attention to hack the web services and the servers on which they run. Thus the need of effective modern intrusion detection system has taken prime importance for any system. At present intrusion detection system (IDS) analysis module uses the pattern matching technology, which is applied in various problems in the field of information security, genetic algorithms and evolutionary algorithm. As one of the solution to intrusion detection problems, pattern matching algorithms shown their advantages. This paper presents a feasibility study on a pattern matching algorithm

References
  1. Anagnostakis K G, Markatos E P, Antonatos S, Polychronakis M, 2003 A domainspecificstring matching algorithm for intrusion detection, Proceedings of the 18th IFIP International Information Security Conference (SEC2003). Athens,Greece: Kluwer AcadamicPubhishers,.
  2. Bi Kun. , Gu. Nai-jie. , Tu Kun. , Liu. Xiao-hu. and Liu. Gang, 2005 A PracticalDistributed String Matching Algorithm Architecture and Implementation Proceeding of world academy of science, engineering and technology.
  3. Cheng Yu–qing, Mei Deng–Hua. 2009 The improved of IntrusionDetection System BM pattern matching algorithm [J]. Computer Technology and Development, 2009 19 (3) :172–174. (In Chinese).
  4. QIN Hai-sheng, LI Xin-hua, WEI Hai-lan and LI Jun-hui 2011Research and optimization of Pattern Matching Algorithm Based on Instrusion Detection System IEEE ,Pp 258-261.
  5. D. E. Knuth, J. H. Morris, and V. R. Pratt, 1974. Fast pattern matching instrings, Stanford University, Stanford, CA, TR CS-74-440.
  6. R. S. Boyer and J. S. Moore, Oct. 1977 A fast string searching algorithm, . ACM, vol. 20, pp. 762–772,.
  7. S. Wu and U. Manber, USA, May 1994 A fast algorithm for multi patterns searching, Technical Report TR 94-17, University of Arizona at Tuscon,.
  8. AHO, A. 1980. "Pattern Matching in Strings," in Formal Language Theory: Perspectives and Open Problems, ed. R. Book, pp. 325-47. London: Academic Press
  9. A. V. Aho and M. J. Corasick, Jun. 1975, Efficient string matching: An aid tobibliographic search," Commun. ACM, vol. 18, pp. 333–340,
  10. Zhengcai Wang, Xiaofeng Wang and Zhengyi Tang may 2013 Analysis and Improvement of AC-BM Algorithm in Intrusion Detection System" journal of networks, vol. 8, no. 5.
  11. Martuza Ahmed, Rima Pal, Md. MojammelHossain, Md. Abu Naser Bikas, and Md. KhaladHasan 2009 A comparative study on the currently existing intrusion detection systems 2009 International Association of Computer Science and Information Technology - Spring Conference,IEEE. Pp. 151-154.
  12. Pei-fei Wu, Hai-juanShen 2012 The Research and Amelioration of Pattern-matching Algorithm in IntrusionDetection System IEEE 14th International Conference on High Performance Computing and Communications,Pp. 1712-1715.
  13. AkhtarRasool, Amrita Tiwari, Gunjan Singla, Nilay Khare 2012 String Matching Methodologies: A Comparative Analysis International Journal of Computer Science and Information Technologies (IJCSIT), Vol. 3 (2) ,Pp. 3394 – 3397.
  14. Zeeshan Ahmed Khan, R. K Pateriya July 2012 Multiple Pattern String Matching Methodologies: A Comparative Analysis International Journal of Scientific and Research Publications, Volume 2, Issue 7,
  15. Jingbo Yuan, Jinsong Yang and ShunliDing 2012 An Improved Pattern Matching Algorithm Based on BHMS 11th International symposium on Disributed Computing and Application to Business ,Engineering & science,IEEE-,Pp 441-445
  16. Cheng Ke-qin,DengLin,WangHui 2013 An improved multi-pattern matching algorithm in intrusion detection Fifth Conference on Measuring and Mechatronic Automation,IEEE-,Pp 203-205.
Index Terms

Computer Science
Information Sciences

Keywords

Intrusion detection pattern matching AC algorithm WU-Manber algorithm. BM algorithm