Exploration of hardware architectures for string matching algorithms in network intrusion detection systems

Muhammad Rashid, Malik Imran, Atif Raza Jafri

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Citations (Scopus)

Abstract

An intrusion detection system monitors and analyzes all the incoming packets, on a given network, to detect any corresponding vulnerabilities and intrusions. It consists of four major modules: packet capturing, packet decoding, packet preprocessing and string/pattern matching. Among these, the string matching is computationally the most intensive part and a number of hardware architectures/designs have already been proposed to accelerate its performance. Consequently, an exploration of existing hardware architectures for string matching algorithms is critical. This paper identifies the most frequently used string matching algorithms and techniques, utilized for the hardware implementation. Subsequently, an exploration of various hardware architectures is provided for the identified algorithms and techniques. Finally, the implementation details of explored architectures are discussed in terms of the used device, consumed hardware resources, operational clock frequency and throughput.

Original languageEnglish
Title of host publicationIAIT '20: Proceedings of the 11th International Conference on Advances in Information Technology
PublisherAssociation for Computing Machinery
Pages1-7
ISBN (Electronic)9781450377591
DOIs
Publication statusPublished - 03 Jul 2020
Externally publishedYes
Event11th International Conference on Advances in Information Technology, IAIT 2020 - Bangkok, Thailand
Duration: 01 Jul 202003 Jul 2020

Publication series

NameACM International Conference Proceeding Series

Conference

Conference11th International Conference on Advances in Information Technology, IAIT 2020
Country/TerritoryThailand
CityBangkok
Period01/07/202003/07/2020

Bibliographical note

Publisher Copyright:
© 2020 ACM.

Keywords

  • hardware implementations
  • Network intrusion detection system
  • string matching algorithms
  • throughput

ASJC Scopus subject areas

  • Software
  • Human-Computer Interaction
  • Computer Vision and Pattern Recognition
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Exploration of hardware architectures for string matching algorithms in network intrusion detection systems'. Together they form a unique fingerprint.

Cite this