Lin et al., 2023 - Google Patents
P4CTM: Compressed traffic pattern matching based on programmable data planeLin et al., 2023
- Document ID
- 6857106784824213511
- Author
- Lin H
- Lin W
- Lin J
- Zhu L
- Zhang D
- Wu C
- Publication year
- Publication venue
- 2023 IEEE Symposium on Computers and Communications (ISCC)
External Links
Snippet
Pattern matching is an important technology applied to many security applications. Most network service providers choose to compress network traffic for better transmission, which brings the challenges of compressed traffic matching. However, existing works focus on …
- 238000004422 calculation algorithm 0 abstract description 21
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/74—Address processing for routing
- H04L45/745—Address table lookup or address filtering
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Application independent communication protocol aspects or techniques in packet data networks
- H04L69/22—Header parsing or analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30943—Information retrieval; Database structures therefor; File system structures therefor details of database functions independent of the retrieved data type
- G06F17/30964—Querying
- G06F17/30979—Query processing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Becchi et al. | A hybrid finite automaton for practical deep packet inspection | |
| Xu et al. | A survey on regular expression matching for deep packet inspection: Applications, algorithms, and hardware platforms | |
| Lin et al. | Using string matching for deep packet inspection | |
| Becchi et al. | Memory-efficient regular expression search using state merging | |
| US8938454B2 (en) | Using a tunable finite automaton for regular expression matching | |
| Chen et al. | A survey on the application of FPGAs for network infrastructure security | |
| CN101213811B (en) | Multi-pattern packet content inspection mechanisms employing tagged values | |
| KR101868720B1 (en) | Compiler for regular expressions | |
| US8862585B2 (en) | Encoding non-derministic finite automation states efficiently in a manner that permits simple and fast union operations | |
| US20050114700A1 (en) | Integrated circuit apparatus and method for high throughput signature based network applications | |
| US20120331007A1 (en) | Anchored Patterns | |
| Bremler-Barr et al. | CompactDFA: Scalable pattern matching using longest prefix match solutions | |
| CN112532642B (en) | A Network Intrusion Detection Method for Industrial Control System Based on Improved Suricata Engine | |
| US8943063B2 (en) | Generating a tunable finite automaton for regular expression matching | |
| Zhao et al. | Rids: Towards advanced ids via rnn model and programmable switches co-designed approaches | |
| Yang et al. | PiDFA: A practical multi-stride regular expression matching engine based on FPGA | |
| Liu et al. | An overlay automata approach to regular expression matching | |
| Wang et al. | Bolt: Scalable and cost-efficient multistring pattern matching with programmable switches | |
| Lin et al. | P4CTM: Compressed traffic pattern matching based on programmable data plane | |
| US8935250B2 (en) | Regrouping non-derministic finite automaton active states to minimize distinct subsets | |
| Wang et al. | Making multi-string pattern matching scalable and cost-efficient with programmable switching asics | |
| Aldwairi et al. | n‐Grams exclusion and inclusion filter for intrusion detection in Internet of Energy big data systems | |
| Wang et al. | Strifa: Stride finite automata for high-speed regular expression matching in network intrusion detection systems | |
| Lenka et al. | A comparative study on DFA-based pattern matching for deep packet inspection | |
| Sourdis | Designs and algorithms for packet and content inspection. |