TFA: A Tunable Finite Automaton for Pattern Matching in Network Intrusion Detection Systems
Deterministic finite automatons (DFAs) and nondeterministic finite automatons (NFAs) are two typical automatons used in the network intrusion detection system. Although they both perform regular expression matching, they have quite different performance and memory usage properties. DFAs provide fast...
Gespeichert in:
Veröffentlicht in: | IEEE journal on selected areas in communications 2014-10, Vol.32 (10), p.1810-1821 |
---|---|
Hauptverfasser: | , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 1821 |
---|---|
container_issue | 10 |
container_start_page | 1810 |
container_title | IEEE journal on selected areas in communications |
container_volume | 32 |
creator | Yang Xu Junchen Jiang Rihua Wei Yang Song Chao, H. Jonathan |
description | Deterministic finite automatons (DFAs) and nondeterministic finite automatons (NFAs) are two typical automatons used in the network intrusion detection system. Although they both perform regular expression matching, they have quite different performance and memory usage properties. DFAs provide fast and deterministic matching performance but suffer from the well-known state explosion problem. NFAs are compact, but their matching performance is unpredictable and with no worst case guarantee. In this paper, we propose a new automaton representation of regular expressions, called tunable finite automaton (TFA), to deal with the DFAs' state explosion problem and the NFAs' unpredictable performance problem. Different from a DFA, which has only one active state, a TFA allows multiple concurrent active states. Thus, the total number of states required by the TFA to track the matching status is much smaller than that required by the DFA. Different from an NFA, a TFA guarantees that the number of concurrent active states is bounded by a bound factor b that can be tuned during the construction of the TFA according to the needs of the application for speed and storage. Simulation results based on regular expression rule sets from Snort and Bro show that, with only two concurrent active states, a TFA can achieve significant reductions in the number of states and memory usage, e.g., a 98% reduction in the number of states and a 95% reduction in memory space. |
doi_str_mv | 10.1109/JSAC.2014.2358856 |
format | Article |
fullrecord | <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_crossref_primary_10_1109_JSAC_2014_2358856</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6905778</ieee_id><sourcerecordid>3512723041</sourcerecordid><originalsourceid>FETCH-LOGICAL-c293t-6727f3bfbf9406b77e4de18febff84978f03867b8f6a24cbd03bde86970ccd1f3</originalsourceid><addsrcrecordid>eNo9kEtLw0AUhQdRsFZ_gLgZcJ06r8zDXahWK_UBrSsXIZPc0dQ2qTMTpP_elBZX9yy-cy58CF1SMqKUmJuneTYeMULFiPFU61QeoQFNU50QQvQxGhDFeaIVlafoLIQl6Umh2QB9LCbZLc7womsKuwI8qZs6As662K6L2DbYtR6_FTGCb_BzEcuvuvnEdYNfIP62_htPm-i7UPfkHUQo4y7NtyHCOpyjE1esAlwc7hC9T-4X48dk9vowHWezpGSGx0Qqphy3zjojiLRKgaiAagfWOS2M0o5wLZXVThZMlLYi3FagpVGkLCvq-BBd73c3vv3pIMR82Xa-6V_mVDLDhNFC9BTdU6VvQ_Dg8o2v14Xf5pTkO4f5zmG-c5gfHPadq32nBoB_XhqSKqX5HxEAbag</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1629249844</pqid></control><display><type>article</type><title>TFA: A Tunable Finite Automaton for Pattern Matching in Network Intrusion Detection Systems</title><source>IEEE Electronic Library (IEL)</source><creator>Yang Xu ; Junchen Jiang ; Rihua Wei ; Yang Song ; Chao, H. Jonathan</creator><creatorcontrib>Yang Xu ; Junchen Jiang ; Rihua Wei ; Yang Song ; Chao, H. Jonathan</creatorcontrib><description>Deterministic finite automatons (DFAs) and nondeterministic finite automatons (NFAs) are two typical automatons used in the network intrusion detection system. Although they both perform regular expression matching, they have quite different performance and memory usage properties. DFAs provide fast and deterministic matching performance but suffer from the well-known state explosion problem. NFAs are compact, but their matching performance is unpredictable and with no worst case guarantee. In this paper, we propose a new automaton representation of regular expressions, called tunable finite automaton (TFA), to deal with the DFAs' state explosion problem and the NFAs' unpredictable performance problem. Different from a DFA, which has only one active state, a TFA allows multiple concurrent active states. Thus, the total number of states required by the TFA to track the matching status is much smaller than that required by the DFA. Different from an NFA, a TFA guarantees that the number of concurrent active states is bounded by a bound factor b that can be tuned during the construction of the TFA according to the needs of the application for speed and storage. Simulation results based on regular expression rule sets from Snort and Bro show that, with only two concurrent active states, a TFA can achieve significant reductions in the number of states and memory usage, e.g., a 98% reduction in the number of states and a 95% reduction in memory space.</description><identifier>ISSN: 0733-8716</identifier><identifier>EISSN: 1558-0008</identifier><identifier>DOI: 10.1109/JSAC.2014.2358856</identifier><identifier>CODEN: ISACEM</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>Automata ; Bandwidth ; Complexity theory ; Computer programming ; Cybersecurity ; Educational institutions ; Encoding ; Explosions ; Memory management</subject><ispartof>IEEE journal on selected areas in communications, 2014-10, Vol.32 (10), p.1810-1821</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Oct 2014</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c293t-6727f3bfbf9406b77e4de18febff84978f03867b8f6a24cbd03bde86970ccd1f3</citedby><cites>FETCH-LOGICAL-c293t-6727f3bfbf9406b77e4de18febff84978f03867b8f6a24cbd03bde86970ccd1f3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6905778$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,780,784,796,27924,27925,54758</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/6905778$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Yang Xu</creatorcontrib><creatorcontrib>Junchen Jiang</creatorcontrib><creatorcontrib>Rihua Wei</creatorcontrib><creatorcontrib>Yang Song</creatorcontrib><creatorcontrib>Chao, H. Jonathan</creatorcontrib><title>TFA: A Tunable Finite Automaton for Pattern Matching in Network Intrusion Detection Systems</title><title>IEEE journal on selected areas in communications</title><addtitle>J-SAC</addtitle><description>Deterministic finite automatons (DFAs) and nondeterministic finite automatons (NFAs) are two typical automatons used in the network intrusion detection system. Although they both perform regular expression matching, they have quite different performance and memory usage properties. DFAs provide fast and deterministic matching performance but suffer from the well-known state explosion problem. NFAs are compact, but their matching performance is unpredictable and with no worst case guarantee. In this paper, we propose a new automaton representation of regular expressions, called tunable finite automaton (TFA), to deal with the DFAs' state explosion problem and the NFAs' unpredictable performance problem. Different from a DFA, which has only one active state, a TFA allows multiple concurrent active states. Thus, the total number of states required by the TFA to track the matching status is much smaller than that required by the DFA. Different from an NFA, a TFA guarantees that the number of concurrent active states is bounded by a bound factor b that can be tuned during the construction of the TFA according to the needs of the application for speed and storage. Simulation results based on regular expression rule sets from Snort and Bro show that, with only two concurrent active states, a TFA can achieve significant reductions in the number of states and memory usage, e.g., a 98% reduction in the number of states and a 95% reduction in memory space.</description><subject>Automata</subject><subject>Bandwidth</subject><subject>Complexity theory</subject><subject>Computer programming</subject><subject>Cybersecurity</subject><subject>Educational institutions</subject><subject>Encoding</subject><subject>Explosions</subject><subject>Memory management</subject><issn>0733-8716</issn><issn>1558-0008</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2014</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNo9kEtLw0AUhQdRsFZ_gLgZcJ06r8zDXahWK_UBrSsXIZPc0dQ2qTMTpP_elBZX9yy-cy58CF1SMqKUmJuneTYeMULFiPFU61QeoQFNU50QQvQxGhDFeaIVlafoLIQl6Umh2QB9LCbZLc7womsKuwI8qZs6As662K6L2DbYtR6_FTGCb_BzEcuvuvnEdYNfIP62_htPm-i7UPfkHUQo4y7NtyHCOpyjE1esAlwc7hC9T-4X48dk9vowHWezpGSGx0Qqphy3zjojiLRKgaiAagfWOS2M0o5wLZXVThZMlLYi3FagpVGkLCvq-BBd73c3vv3pIMR82Xa-6V_mVDLDhNFC9BTdU6VvQ_Dg8o2v14Xf5pTkO4f5zmG-c5gfHPadq32nBoB_XhqSKqX5HxEAbag</recordid><startdate>201410</startdate><enddate>201410</enddate><creator>Yang Xu</creator><creator>Junchen Jiang</creator><creator>Rihua Wei</creator><creator>Yang Song</creator><creator>Chao, H. Jonathan</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SP</scope><scope>8FD</scope><scope>L7M</scope></search><sort><creationdate>201410</creationdate><title>TFA: A Tunable Finite Automaton for Pattern Matching in Network Intrusion Detection Systems</title><author>Yang Xu ; Junchen Jiang ; Rihua Wei ; Yang Song ; Chao, H. Jonathan</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c293t-6727f3bfbf9406b77e4de18febff84978f03867b8f6a24cbd03bde86970ccd1f3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2014</creationdate><topic>Automata</topic><topic>Bandwidth</topic><topic>Complexity theory</topic><topic>Computer programming</topic><topic>Cybersecurity</topic><topic>Educational institutions</topic><topic>Encoding</topic><topic>Explosions</topic><topic>Memory management</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Yang Xu</creatorcontrib><creatorcontrib>Junchen Jiang</creatorcontrib><creatorcontrib>Rihua Wei</creatorcontrib><creatorcontrib>Yang Song</creatorcontrib><creatorcontrib>Chao, H. Jonathan</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Electronics & Communications Abstracts</collection><collection>Technology Research Database</collection><collection>Advanced Technologies Database with Aerospace</collection><jtitle>IEEE journal on selected areas in communications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Yang Xu</au><au>Junchen Jiang</au><au>Rihua Wei</au><au>Yang Song</au><au>Chao, H. Jonathan</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>TFA: A Tunable Finite Automaton for Pattern Matching in Network Intrusion Detection Systems</atitle><jtitle>IEEE journal on selected areas in communications</jtitle><stitle>J-SAC</stitle><date>2014-10</date><risdate>2014</risdate><volume>32</volume><issue>10</issue><spage>1810</spage><epage>1821</epage><pages>1810-1821</pages><issn>0733-8716</issn><eissn>1558-0008</eissn><coden>ISACEM</coden><abstract>Deterministic finite automatons (DFAs) and nondeterministic finite automatons (NFAs) are two typical automatons used in the network intrusion detection system. Although they both perform regular expression matching, they have quite different performance and memory usage properties. DFAs provide fast and deterministic matching performance but suffer from the well-known state explosion problem. NFAs are compact, but their matching performance is unpredictable and with no worst case guarantee. In this paper, we propose a new automaton representation of regular expressions, called tunable finite automaton (TFA), to deal with the DFAs' state explosion problem and the NFAs' unpredictable performance problem. Different from a DFA, which has only one active state, a TFA allows multiple concurrent active states. Thus, the total number of states required by the TFA to track the matching status is much smaller than that required by the DFA. Different from an NFA, a TFA guarantees that the number of concurrent active states is bounded by a bound factor b that can be tuned during the construction of the TFA according to the needs of the application for speed and storage. Simulation results based on regular expression rule sets from Snort and Bro show that, with only two concurrent active states, a TFA can achieve significant reductions in the number of states and memory usage, e.g., a 98% reduction in the number of states and a 95% reduction in memory space.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/JSAC.2014.2358856</doi><tpages>12</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 0733-8716 |
ispartof | IEEE journal on selected areas in communications, 2014-10, Vol.32 (10), p.1810-1821 |
issn | 0733-8716 1558-0008 |
language | eng |
recordid | cdi_crossref_primary_10_1109_JSAC_2014_2358856 |
source | IEEE Electronic Library (IEL) |
subjects | Automata Bandwidth Complexity theory Computer programming Cybersecurity Educational institutions Encoding Explosions Memory management |
title | TFA: A Tunable Finite Automaton for Pattern Matching in Network Intrusion Detection Systems |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-30T13%3A59%3A31IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=TFA:%20A%20Tunable%20Finite%20Automaton%20for%20Pattern%20Matching%20in%20Network%20Intrusion%20Detection%20Systems&rft.jtitle=IEEE%20journal%20on%20selected%20areas%20in%20communications&rft.au=Yang%20Xu&rft.date=2014-10&rft.volume=32&rft.issue=10&rft.spage=1810&rft.epage=1821&rft.pages=1810-1821&rft.issn=0733-8716&rft.eissn=1558-0008&rft.coden=ISACEM&rft_id=info:doi/10.1109/JSAC.2014.2358856&rft_dat=%3Cproquest_RIE%3E3512723041%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1629249844&rft_id=info:pmid/&rft_ieee_id=6905778&rfr_iscdi=true |