Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/1364654.1364656acmconferencesArticle/Chapter ViewAbstractPublication PagesconextConference Proceedingsconference-collections
research-article

A hybrid finite automaton for practical deep packet inspection

Published: 10 December 2007 Publication History

Abstract

Deterministic finite automata (DFAs) are widely used to perform regular expression matching in linear time. Several techniques have been proposed to compress DFAs in order to reduce memory requirements. Unfortunately, many real-world IDS regular expressions include complex terms that result in an exponential increase in number of DFA states. Since all recent proposals use an initial DFA as a starting-point, they cannot be used as comprehensive regular expression representations in an IDS.
In this work we propose a hybrid automaton which addresses this issue by combining the benefits of deterministic and non-deterministic finite automata. We test our proposal on Snort rule-sets and we validate it on real traffic traces. Finally, we address and analyze the worst case behavior of our scheme and compare it to traditional ones.

References

[1]
A. V. Aho and M. J. Corasick, "Efficient String Matching: An Aid to Bibliographic Search," Communications of the ACM, pp. 333--340, 1975.
[2]
B. Commentz-Walter, "A string matching algorithm fast on the average," in ICALP, July 1979.
[3]
S. Wu, U. Manber, "A fast algorithm for multi-pattern searching," Tech. Report TR-94-17, Univ of Arizona, 1994.
[4]
J. E. Hopcroft and J. D. Ullman, "Introduction to Automata Theory, Languages, and Computation," Addison Wesley, 1979.
[5]
J. Hopcroft, "An nlogn algorithm for minimizing states in a finite automaton," in Theory of Machines and Computation, J. Kohavi, Ed. New York: Academic, 1971, pp. 189--196.
[6]
M. Roesch, "Snort: Lightweight Intrusion Detection for Networks," in System Administration Conf., 1999
[7]
Snort: http://www.Snort.org/
[8]
Cisco Systems. Cisco ASA 5505 Adaptive Security Appliance. http://www.cisco.com.2007.
[9]
Citrix Systems. Citrix Application Firewall. http://www.citrix.com. 2007.
[10]
Bro: http://bro-ids.org/
[11]
Vern Paxson et al., "Flex: A fast scanner generator," http://www.gnu.org/software/flex/
[12]
R. Sommer and V. Paxson, "Enhancing byte-level network intrusion detection signatures with context.", in CCS 2003.
[13]
N. Tuck, T. Sherwood, B. Calder, and G. Varghese, "Deterministic memory-efficient string matching algorithms for intrusion detection," in Infocom 2004.
[14]
L. Tan, and T. Sherwood, "A High Throughput String Matching Architecture for Intrusion Detection and Prevention," ISCA 2005.
[15]
F. Yu, Z. Chen, Y. Diao, T. V. Lakshman, and R. H. Katz, "Fast and Memory-Efficient Regular Expression Matching for Deep Packet Inspection", in ANCS 2006
[16]
S. Kumar et alt., "Algorithms to Accelerate Multiple Regular Expressions Matching for Deep Packet Inspection," in ACM SIGCOMM, Sept 2006.
[17]
S. Kumar, et alt, "Advanced Algorithms for Fast and Scalable Deep Packet Inspection", in ANCS 2006
[18]
M. Becchi and S. Cadambi, "Memory-Efficient Regular Expression Search Using State Merging", in INFOCOM 2007
[19]
M. Becchi and P. Crowley, "An Improved Algorithm to Accelerate Regular Expression Evaluation", in ANCS 2007
[20]
M. Becchi and P. Crowley, "Addressing complex regular expressions through counting automata", Washington University Tech. Report, July 2007.
[21]
R. W. Floyd, and J. D. Ullman, "The Compilation of Regular Expressions into Integrated Circuits", Journal of ACM, vol. 29, no. 3, pp 603--622, July 1982.
[22]
R. Sidhu and V. K. Prasanna, "Fast Regular Expression Matching using FPGAs", in FCCM 2001
[23]
C. R. Clark and D. E. Schimmel, "Efficient reconfigurable logic circuit for matching complex network intrusion detection patterns," in FLP 2003.
[24]
J. Moscola et alt., "Implementation of a content-scanning module for an internet firewall," in FCCM, USA, April 2003.
[25]
Internet traffic traces: http://cctf.shmoo.com/
[26]
Cu-11 standard cell/gate array ASIC, IBM. www.ibm.com

Cited By

View all
  • (2024)ngAP: Non-blocking Large-scale Automata Processing on GPUsProceedings of the 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 110.1145/3617232.3624848(268-285)Online publication date: 27-Apr-2024
  • (2023)hAP: A Spatial-von Neumann Heterogeneous Automata Processor with Optimized Resource and IO Overhead on FPGAProceedings of the 2023 ACM/SIGDA International Symposium on Field Programmable Gate Arrays10.1145/3543622.3573190(185-196)Online publication date: 12-Feb-2023
  • (2023)Modular VNF Components Acceleration With FPGA OverlaysIEEE Transactions on Network and Service Management10.1109/TNSM.2022.321144820:1(846-857)Online publication date: Mar-2023
  • Show More Cited By

Index Terms

  1. A hybrid finite automaton for practical deep packet inspection

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    CoNEXT '07: Proceedings of the 2007 ACM CoNEXT conference
    December 2007
    448 pages
    ISBN:9781595937704
    DOI:10.1145/1364654
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 10 December 2007

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. DFA
    2. NFA
    3. deep packet inspection
    4. regular expressions

    Qualifiers

    • Research-article

    Funding Sources

    Acceptance Rates

    Overall Acceptance Rate 198 of 789 submissions, 25%

    Upcoming Conference

    CoNEXT '24

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)14
    • Downloads (Last 6 weeks)3
    Reflects downloads up to 22 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)ngAP: Non-blocking Large-scale Automata Processing on GPUsProceedings of the 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 110.1145/3617232.3624848(268-285)Online publication date: 27-Apr-2024
    • (2023)hAP: A Spatial-von Neumann Heterogeneous Automata Processor with Optimized Resource and IO Overhead on FPGAProceedings of the 2023 ACM/SIGDA International Symposium on Field Programmable Gate Arrays10.1145/3543622.3573190(185-196)Online publication date: 12-Feb-2023
    • (2023)Modular VNF Components Acceleration With FPGA OverlaysIEEE Transactions on Network and Service Management10.1109/TNSM.2022.321144820:1(846-857)Online publication date: Mar-2023
    • (2023)Bolt: Scalable and Cost-Efficient Multistring Pattern Matching With Programmable SwitchesIEEE/ACM Transactions on Networking10.1109/TNET.2022.320252331:2(846-861)Online publication date: Apr-2023
    • (2023)An Energy-Efficient Domain-Specific Architecture for Regular ExpressionsIEEE Transactions on Emerging Topics in Computing10.1109/TETC.2022.315794811:1(3-17)Online publication date: 1-Jan-2023
    • (2023)Enabling Fast and Memory-Efficient Acceleration for Pattern Matching Workloads: The Lightweight Automata Processing EngineIEEE Transactions on Computers10.1109/TC.2022.318733872:4(1011-1025)Online publication date: 1-Apr-2023
    • (2023)RegexClassifier: A GNN-Based Recognition Method for State-Explosive Regular Expressions2023 IEEE Symposium on Computers and Communications (ISCC)10.1109/ISCC58397.2023.10218248(1039-1045)Online publication date: 9-Jul-2023
    • (2023)Dazzle-attack: Anti-Forensic Server-side Attack via Fail-Free Dynamic State MachineInformation Security Applications10.1007/978-3-031-25659-2_15(204-221)Online publication date: 4-Feb-2023
    • (2022)Offset-FA: A Uniform Method to Handle Both Unbounded and Bounded Repetitions in Regular Expression MatchingSensors10.3390/s2220778122:20(7781)Online publication date: 13-Oct-2022
    • (2021)CICERO: A Domain-Specific Architecture for Efficient Regular Expression MatchingACM Transactions on Embedded Computing Systems10.1145/347698220:5s(1-24)Online publication date: 17-Sep-2021
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media