Abstract
Memory architectures have been widely adopted in network intrusion detection system for inspecting malicious packets due to their flexibility and scalability. Memory architectures match input streams against thousands of attack patterns by traversing the corresponding state transition table stored in commodity memories. With the increasing number of attack patterns, reducing memory requirement has become critical for memory architectures. In this paper, we propose a novel memory architecture using perfect hashing to condense state transition tables without hash collisions. The proposed memory architecture achieves up to 99.5% improvement in memory reduction compared to the traditional two-dimensional memory architecture. We have implemented our memory architectures on graphic processing units and tested using attack patterns from Snort V2.8 and input packets form DEFCON. The experimental results show that the proposed memory architectures outperform state-of-the-art memory architectures both on performance and memory efficiency.
| Original language | English |
|---|---|
| Title of host publication | 2012 Proceedings IEEE INFOCOM, INFOCOM 2012 |
| Pages | 1978-1986 |
| Number of pages | 9 |
| DOIs | |
| Publication status | Published - 2012 |
| Event | IEEE Conference on Computer Communications, INFOCOM 2012 - Orlando, FL, United States Duration: 2012 Mar 25 → 2012 Mar 30 |
Publication series
| Name | Proceedings - IEEE INFOCOM |
|---|---|
| ISSN (Print) | 0743-166X |
Other
| Other | IEEE Conference on Computer Communications, INFOCOM 2012 |
|---|---|
| Country/Territory | United States |
| City | Orlando, FL |
| Period | 2012/03/25 → 2012/03/30 |
Keywords
- deterministic finite automaton
- pattern matching
- perfect hashing
ASJC Scopus subject areas
- General Computer Science
- Electrical and Electronic Engineering