[go: up one dir, main page]

Lin et al., 2023 - Google Patents

P4CTM: Compressed traffic pattern matching based on programmable data plane

Lin et al., 2023

Document ID
6857106784824213511
Author
Lin H
Lin W
Lin J
Zhu L
Zhang D
Wu C
Publication year
Publication venue
2023 IEEE Symposium on Computers and Communications (ISCC)

External Links

Snippet

Pattern matching is an important technology applied to many security applications. Most network service providers choose to compress network traffic for better transmission, which brings the challenges of compressed traffic matching. However, existing works focus on …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/74Address processing for routing
    • H04L45/745Address table lookup or address filtering
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Application independent communication protocol aspects or techniques in packet data networks
    • H04L69/22Header parsing or analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30943Information retrieval; Database structures therefor; File system structures therefor details of database functions independent of the retrieved data type
    • G06F17/30964Querying
    • G06F17/30979Query processing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communication the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators

Similar Documents

Publication Publication Date Title
Becchi et al. A hybrid finite automaton for practical deep packet inspection
Xu et al. A survey on regular expression matching for deep packet inspection: Applications, algorithms, and hardware platforms
Lin et al. Using string matching for deep packet inspection
Becchi et al. Memory-efficient regular expression search using state merging
US8938454B2 (en) Using a tunable finite automaton for regular expression matching
Chen et al. A survey on the application of FPGAs for network infrastructure security
CN101213811B (en) Multi-pattern packet content inspection mechanisms employing tagged values
KR101868720B1 (en) Compiler for regular expressions
US8862585B2 (en) Encoding non-derministic finite automation states efficiently in a manner that permits simple and fast union operations
US20050114700A1 (en) Integrated circuit apparatus and method for high throughput signature based network applications
US20120331007A1 (en) Anchored Patterns
Bremler-Barr et al. CompactDFA: Scalable pattern matching using longest prefix match solutions
CN112532642B (en) A Network Intrusion Detection Method for Industrial Control System Based on Improved Suricata Engine
US8943063B2 (en) Generating a tunable finite automaton for regular expression matching
Zhao et al. Rids: Towards advanced ids via rnn model and programmable switches co-designed approaches
Yang et al. PiDFA: A practical multi-stride regular expression matching engine based on FPGA
Liu et al. An overlay automata approach to regular expression matching
Wang et al. Bolt: Scalable and cost-efficient multistring pattern matching with programmable switches
Lin et al. P4CTM: Compressed traffic pattern matching based on programmable data plane
US8935250B2 (en) Regrouping non-derministic finite automaton active states to minimize distinct subsets
Wang et al. Making multi-string pattern matching scalable and cost-efficient with programmable switching asics
Aldwairi et al. n‐Grams exclusion and inclusion filter for intrusion detection in Internet of Energy big data systems
Wang et al. Strifa: Stride finite automata for high-speed regular expression matching in network intrusion detection systems
Lenka et al. A comparative study on DFA-based pattern matching for deep packet inspection
Sourdis Designs and algorithms for packet and content inspection.