Flexible pattern matching algorithm in chinese strings

5Citations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Presently the research on the security of network contents has faced the challenge of network breakthrough techniques. A popular Chinese network breakthrough technique is to jam malicious characters in key words, and /or replace the Chinese characters in key words with homonyms or homophones, or complicated Chinese characters. With this method some malicious web pages make themselves escape from the network filtering and intrusion detection. While most existing pattern matching algorithms in Chinese strings cannot detect this kind of attacks. In this paper we give a formulized definition of flexible pattern matching in Chinese strings, and compare the classical algorithms for pattern matching in strings, and choose the prefix searching strategy to realize the flexible algorithms for pattern matching in single-pattern string and multi-pattern string. Our algorithm can match the Chinese strings jammed with malicious characters, and partially resolve the Chinese network breakthrough problem that other classical matching algorithms in string cannot solve.

Cite

CITATION STYLE

APA

Zhou, X., & Zhang, H. (2008). Flexible pattern matching algorithm in chinese strings. In Proceedings of the 27th Chinese Control Conference, CCC (pp. 610–614). https://doi.org/10.1109/CHICC.2008.4604947

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free