Nothing Special   »   [go: up one dir, main page]

skip to main content
article

Picking Pesky Parameters: Optimizing Regular Expression Matching in Practice

Published: 01 May 2016 Publication History

Abstract

Network security systems inspect packet payloads for signatures of attacks. These systems use regular expression matching at their core. Many techniques for implementing regular expression matching at line rate have been proposed. Solutions differ in the type of automaton used (i.e., deterministic versus non-deterministic) and in the configuration of implementation-specific parameters. While each solution has been shown to perform well on specific rule sets and traffic patterns, there has been no systematic comparison across a large set of solutions, rule sets and traffic patterns. Thus, it is extremely challenging for a practitioner to make an informed decision within the plethora of existing algorithmic and architectural proposals. Moreover, as multi-core processors are becoming popular, many parameters need to be tuned to maximize the multi-core potential. To address this problem, we present a comprehensive evaluation of a broad set of regular expression matching techniques. We consider both algorithmic and architectural aspects. Specifically, we explore the performance, area requirements, and power consumption of implementations targeting multi-core processors and FPGAs using rule sets of practical size and complexity. We present detailed performance results and specific guidelines for determining optimal configurations based on a simple evaluation of the rule set. These guidelines can help significantlywhen implementing regular expression matching systems in practice.

Cited By

View all
  • (2020)A Survey on FPGA Support for the Feasible Execution of Virtualized Network FunctionsIEEE Communications Surveys & Tutorials10.1109/COMST.2019.294369022:1(504-525)Online publication date: 9-Mar-2020
  • (2018)HESProceedings of the 2018 2nd High Performance Computing and Cluster Technologies Conference10.1145/3234664.3234669(69-78)Online publication date: 22-Jun-2018
  • (2018)Regular Expression Matching with Memristor TCAMs for Network SecurityProceedings of the 14th IEEE/ACM International Symposium on Nanoscale Architectures10.1145/3232195.3232201(65-71)Online publication date: 17-Jul-2018

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image IEEE Transactions on Parallel and Distributed Systems
IEEE Transactions on Parallel and Distributed Systems  Volume 27, Issue 5
May 2016
314 pages

Publisher

IEEE Press

Publication History

Published: 01 May 2016

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 21 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2020)A Survey on FPGA Support for the Feasible Execution of Virtualized Network FunctionsIEEE Communications Surveys & Tutorials10.1109/COMST.2019.294369022:1(504-525)Online publication date: 9-Mar-2020
  • (2018)HESProceedings of the 2018 2nd High Performance Computing and Cluster Technologies Conference10.1145/3234664.3234669(69-78)Online publication date: 22-Jun-2018
  • (2018)Regular Expression Matching with Memristor TCAMs for Network SecurityProceedings of the 14th IEEE/ACM International Symposium on Nanoscale Architectures10.1145/3232195.3232201(65-71)Online publication date: 17-Jul-2018

View Options

View options

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media