Memory Efficient Regular Expression Pattern Matching Architecture For Network Intrusion Detection Systems

The rampant growth of the Internet has been coupled with an equivalent growth in cyber crime over the Internet. With our increased reliance on the Internet for commerce, social networking, information acquisition, and information exchange, intruders have found financial, political, and military moti...

Full description

Bibliographic Details
Main Author: Kumar, Pawan
Other Authors: Balakrishnan, N
Language:en_US
Published: 2014
Subjects:
Online Access:http://etd.iisc.ernet.in/handle/2005/2321
http://etd.ncsi.iisc.ernet.in/abstracts/2985/G25266-Abs.pdf
id ndltd-IISc-oai-etd.ncsi.iisc.ernet.in-2005-2321
record_format oai_dc
spelling ndltd-IISc-oai-etd.ncsi.iisc.ernet.in-2005-23212018-01-10T03:36:37ZMemory Efficient Regular Expression Pattern Matching Architecture For Network Intrusion Detection SystemsKumar, PawanAccess Control (Computer Networks)CryptographyNetwork Intrusion Detection SystemComputer SecurityCyber-attackNetwork Intrusion Detection - Regular Expression Pattern MatchingCascaded Automata ArchitectureDeterministic Finite AutomataNetwork Intrusion Detection - Memory Efficient AlgorithmsNetwork Intrustion Detection System SignaturesNetwork Intrusion Detection Systems (NIDS)Modified Word-based NFA (M-WNFA)Network SecurityPattern MatchingComputer ScienceThe rampant growth of the Internet has been coupled with an equivalent growth in cyber crime over the Internet. With our increased reliance on the Internet for commerce, social networking, information acquisition, and information exchange, intruders have found financial, political, and military motives for their actions. Network Intrusion Detection Systems (NIDSs) intercept the traffic at an organization’s periphery and try to detect intrusion attempts. Signature-based NIDSs compare the packet to a signature database consisting of known attacks and malicious packet fingerprints. The signatures use regular expressions to model these intrusion activities. This thesis presents a memory efficient pattern matching system for the class of regular expressions appearing frequently in the NIDS signatures. Proposed Cascaded Automata Architecture is based on two stage automata. The first stage recognizes the sub-strings and character classes present in the regular expression. The second stage consumes symbol generated by the first stage upon receiving input traffic symbols. The basic idea is to utilize the research done on string matching problem for regular expression pattern matching. We formally model the class of regular expressions mostly found in NIDS signatures. The challenges involved in using string matching algorithms for regular expression matching has been presented. We introduce length-bound transitions, counter-based states, and associated counter arrays in the second stage automata to address these challenges. The system uses length information along with counter arrays to keep track of overlapped sub-strings and character class based transition. We present efficient implementation techniques for counter arrays. The evaluation of the architecture on practical expressions from Snort rule set showed compression in number of states between 50% to 85%. Because of its smaller memory footprint, our solution is suitable for both software based implementations on network chips as well as FPGA based designs.Balakrishnan, NSingh, Virendra2014-06-05T07:13:39Z2014-06-05T07:13:39Z2014-06-052012-08Thesishttp://etd.iisc.ernet.in/handle/2005/2321http://etd.ncsi.iisc.ernet.in/abstracts/2985/G25266-Abs.pdfen_USG25266
collection NDLTD
language en_US
sources NDLTD
topic Access Control (Computer Networks)
Cryptography
Network Intrusion Detection System
Computer Security
Cyber-attack
Network Intrusion Detection - Regular Expression Pattern Matching
Cascaded Automata Architecture
Deterministic Finite Automata
Network Intrusion Detection - Memory Efficient Algorithms
Network Intrustion Detection System Signatures
Network Intrusion Detection Systems (NIDS)
Modified Word-based NFA (M-WNFA)
Network Security
Pattern Matching
Computer Science
spellingShingle Access Control (Computer Networks)
Cryptography
Network Intrusion Detection System
Computer Security
Cyber-attack
Network Intrusion Detection - Regular Expression Pattern Matching
Cascaded Automata Architecture
Deterministic Finite Automata
Network Intrusion Detection - Memory Efficient Algorithms
Network Intrustion Detection System Signatures
Network Intrusion Detection Systems (NIDS)
Modified Word-based NFA (M-WNFA)
Network Security
Pattern Matching
Computer Science
Kumar, Pawan
Memory Efficient Regular Expression Pattern Matching Architecture For Network Intrusion Detection Systems
description The rampant growth of the Internet has been coupled with an equivalent growth in cyber crime over the Internet. With our increased reliance on the Internet for commerce, social networking, information acquisition, and information exchange, intruders have found financial, political, and military motives for their actions. Network Intrusion Detection Systems (NIDSs) intercept the traffic at an organization’s periphery and try to detect intrusion attempts. Signature-based NIDSs compare the packet to a signature database consisting of known attacks and malicious packet fingerprints. The signatures use regular expressions to model these intrusion activities. This thesis presents a memory efficient pattern matching system for the class of regular expressions appearing frequently in the NIDS signatures. Proposed Cascaded Automata Architecture is based on two stage automata. The first stage recognizes the sub-strings and character classes present in the regular expression. The second stage consumes symbol generated by the first stage upon receiving input traffic symbols. The basic idea is to utilize the research done on string matching problem for regular expression pattern matching. We formally model the class of regular expressions mostly found in NIDS signatures. The challenges involved in using string matching algorithms for regular expression matching has been presented. We introduce length-bound transitions, counter-based states, and associated counter arrays in the second stage automata to address these challenges. The system uses length information along with counter arrays to keep track of overlapped sub-strings and character class based transition. We present efficient implementation techniques for counter arrays. The evaluation of the architecture on practical expressions from Snort rule set showed compression in number of states between 50% to 85%. Because of its smaller memory footprint, our solution is suitable for both software based implementations on network chips as well as FPGA based designs.
author2 Balakrishnan, N
author_facet Balakrishnan, N
Kumar, Pawan
author Kumar, Pawan
author_sort Kumar, Pawan
title Memory Efficient Regular Expression Pattern Matching Architecture For Network Intrusion Detection Systems
title_short Memory Efficient Regular Expression Pattern Matching Architecture For Network Intrusion Detection Systems
title_full Memory Efficient Regular Expression Pattern Matching Architecture For Network Intrusion Detection Systems
title_fullStr Memory Efficient Regular Expression Pattern Matching Architecture For Network Intrusion Detection Systems
title_full_unstemmed Memory Efficient Regular Expression Pattern Matching Architecture For Network Intrusion Detection Systems
title_sort memory efficient regular expression pattern matching architecture for network intrusion detection systems
publishDate 2014
url http://etd.iisc.ernet.in/handle/2005/2321
http://etd.ncsi.iisc.ernet.in/abstracts/2985/G25266-Abs.pdf
work_keys_str_mv AT kumarpawan memoryefficientregularexpressionpatternmatchingarchitecturefornetworkintrusiondetectionsystems
_version_ 1718603731348488192