publication . Article . Other literature type . 2013

Techniques Used In String Matching For Network Security

Jamuna Bhandari;
Open Access English
  • Published: 23 Nov 2013
Abstract
String matching also known as pattern matching is<br> one of primary concept for network security. In this area the<br> effectiveness and efficiency of string matching algorithms is<br> important for applications in network security such as network<br> intrusion detection, virus detection, signature matching and web<br> content filtering system. This paper presents brief review on some of<br> string matching techniques used for network security.
Subjects
free text keywords: Filtering, honeypot, network telescope, pattern, string, signature.
Related Organizations
Funded by
NSF| Quantitative Network Security Analysis
Project
  • Funder: National Science Foundation (NSF)
  • Project Code: 0311690
  • Funding stream: Directorate for Computer & Information Science & Engineering | Division of Computer and Network Systems
ZENODO
Article . 2013
Provider: ZENODO
ZENODO
Article . 2013
Provider: ZENODO
Zenodo
Other literature type . 2014
Provider: Datacite
Zenodo
Other literature type . 2013
Provider: Datacite
22 references, page 1 of 2

[1] G. O. Young, “Synthetic structure of industrial plastics (Book style with paper title and editor),” in Plastics, 2nd ed. vol. 3, J. Peters, Ed. New York: McGraw-Hill, 1964, pp. 15-64.

[2] Young H. Cho and William H. Mangione-Smith. A Pattern Matching Co-processor for Network Security. Anaheim, California, USA. 2005 ACM 1-59593-058-2/05/0006, 2005

[3] Robert Giegerich, Frank Hischk. A General Technique to Improve Filter algorithms for Approximate String Matching. Fourth South American Workshop on String, 1997

[4] Le Zhang, Jingbo Zhu, Tianshun Yao. An Evaluation of Statistical Spam Filtering Techniques. ACM Transactions on Asian Language Information Processing, Vol. 3, No. 4, , Pages 243-269, 2004

[5] Ernest Romanofski. A Comparison of Packet Filtering Vs Application Level Fire wall Technology. Global Information Assurance Certification Paper SANS institute, 2002

[6] Kyi Lin LinKyaw. Hybrid Honeypot System for Network Security. World Academy of Science, Engineering and Technology, 2008

[7] Honeypot Design for Intrusion Detection, American U. of Beirut, 2004

[8] Jean-Pierre van Riel, Barry Irwin. InetVis, a Visual Tool for Network Telescope Traffic Analysis. AFRIGRAPH 2006, Cape Town, South Africa, ACM 1-59593-288-7/06/0001, 2006

[9] David Moore et al. Network Telescopes: Technical Report support for this work is provided by NSF Trusted Computing Grant CCR-0311690, Cisco Systems University Research Program, DARPA National Institute of Standards Grant 60NANB1D0118, and a generous gift from AT&T, 2004

[10] Haoyu Song, John W. Lockwood. Multi-pattern Signature Matching for Hardware Network Intrusion Detection Systems. 0-7803-9415-1/05. IEEE, 2005

[11] R. Smith, S.Jha 'XFA: Faster Signature Matching with Extended Automata' IEEE Symposium on Security and Privacy (Oakland), May 2008

[12] A. Aho and M. J. Corasick. Efficient string matching: An aid to bibliographic search. Communications of the ACM, 1975 [OpenAIRE]

[13] U. Manber and S. Wu, “ A fast algorithm for multi-pattern searching, ”in T ech.Report TR-94-17, CS Dept., University of Arizona, 1994

[14] HyunJin Kim 'A Memory-Efficient Bit Split Parallel String Matching Using Pattern Dividing for Intrusion Detection Systems' IEEE, vol. 13, no. 12, 2009

[15] Prasad. R, Agarwal. S, 'A new parameterized string matching algorithm by combining bit-parallelism and suffix automata' IEEE International Conference on Computer and Information Technology, 2008

22 references, page 1 of 2
Powered by OpenAIRE Open Research Graph
Any information missing or wrong?Report an Issue
publication . Article . Other literature type . 2013

Techniques Used In String Matching For Network Security

Jamuna Bhandari;