Piranha: Fast and memory-efficient pattern matching for intrusion detection

17Citations
Citations of this article
13Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Network Intrusion Detection Systems (NIDS) provide an important security function to help defend against network attacks. As network speeds and detection workloads increase, it is important for NIDSes to be highly efficient. Most NIDSes need to check for thousands of known attack patterns in every packet, making pattern matching the most expensive part of signature-based NIDSes in terms of processing and memory resources. This paper describes Piranha, a new algorithm for pattern matching tailored specifically for intrusion detection. Piranha is based on the observation that if the rarest substring of a pattern does not appear, then the whole pattern will definitely not match. Our experimental results, based on traces that represent typical NIDS workloads, indicate that Piranha can enhance the performance of a NIDS by 11% to 28% in terms of processing time and by 18% to 73% in terms of memory usage compared to existing NIDS pattern matching algorithms. Copyright © 2005 by International Federation for Information Processing.

Cite

CITATION STYLE

APA

Antonatos, S., Polychronakis, M., Akritidis, P., Anagnostakis, K. G., & Markatos, E. P. (2005). Piranha: Fast and memory-efficient pattern matching for intrusion detection. In IFIP Advances in Information and Communication Technology (Vol. 181, pp. 393–408). Springer New York LLC. https://doi.org/10.1007/0-387-25660-1_26

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free