@inproceedings{45895872f089497f9791e21518793f0c,
title = "Memory-efficient pattern matching architectures using perfect hashing on graphic processing units",
abstract = "Memory architectures have been widely adopted in network intrusion detection system for inspecting malicious packets due to their flexibility and scalability. Memory architectures match input streams against thousands of attack patterns by traversing the corresponding state transition table stored in commodity memories. With the increasing number of attack patterns, reducing memory requirement has become critical for memory architectures. In this paper, we propose a novel memory architecture using perfect hashing to condense state transition tables without hash collisions. The proposed memory architecture achieves up to 99.5% improvement in memory reduction compared to the traditional two-dimensional memory architecture. We have implemented our memory architectures on graphic processing units and tested using attack patterns from Snort V2.8 and input packets form DEFCON. The experimental results show that the proposed memory architectures outperform state-of-the-art memory architectures both on performance and memory efficiency.",
keywords = "deterministic finite automaton, pattern matching, perfect hashing",
author = "Lin, {Cheng Hung} and Liu, {Chen Hsiung} and Chang, {Shih Chieh} and Hon, {Wing Kai}",
year = "2012",
doi = "10.1109/INFCOM.2012.6195575",
language = "English",
isbn = "9781467307758",
series = "Proceedings - IEEE INFOCOM",
pages = "1978--1986",
booktitle = "2012 Proceedings IEEE INFOCOM, INFOCOM 2012",
note = "IEEE Conference on Computer Communications, INFOCOM 2012 ; Conference date: 25-03-2012 Through 30-03-2012",
}