[1]甘学士 孙力娟.改进的模式匹配算法及在入侵检测中的应用[J].计算机技术与发展,2006,(07):150-152.
 GAN Xue-shi,SUN Li-juan.An Improved Algorithm for Pattern Matching and Its Application Intrusion Detection System[J].,2006,(07):150-152.
点击复制

改进的模式匹配算法及在入侵检测中的应用()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
期数:
2006年07期
页码:
150-152
栏目:
安全与防范
出版日期:
1900-01-01

文章信息/Info

Title:
An Improved Algorithm for Pattern Matching and Its Application Intrusion Detection System
文章编号:
1673-629X(2006)07-0150-03
作者:
甘学士 孙力娟
南京邮电大学计算机学院
Author(s):
GAN Xue-shi SUN Li-juan
College of Computer, Nanjing University of Posts and Telecommunications
关键词:
入侵检测模式匹配计数过滤法末位字符
Keywords:
intrusion detection pattern matching counting filter approachultimate character
分类号:
TP301.6
文献标志码:
A
摘要:
基于字符串匹配的检测方法是入侵检测系统中一类重要的分析方法。文中在分析现有模式匹配算法的基础上,针对入侵检测的特点,对一种允许插入模式匹配算法——计数过滤法进行了深入研究,提出了改进的计数过滤法。算法利用末位字符跳过尽可能多的字符,同时根据文本窗中字符的有序性,最大限度地减少验证次数,加快匹配速度,从而提高入侵检测的效率
Abstract:
String matching algorithms are very important analyzing methods in intrusion detection. This paper analyzes the existing pattern -matching algorithms, studies deeply on an algorithm named counting liter allowing errors, and shows an improved one for intrusion detection. This algorithm makes the best of the ultimate character to overlap characters as much as possible, and reduces verifying. All of these speed up the matching to advance the efficiency of intrusion detection

相似文献/References:

[1]李雷 丁亚丽 罗红旗.基于规则约束制导的入侵检测研究[J].计算机技术与发展,2010,(03):143.
 LI Lei,DING Ya-li,LUO Hong-qi.Intrusion Detection Technology Research Based on Homing - Constraint Rule[J].,2010,(07):143.
[2]马志远,曹宝香.改进的决策树算法在入侵检测中的应用[J].计算机技术与发展,2014,24(01):151.
 MA Zhi-yuan,CAO Bao-xiang.Application of Improved Decision Tree Algorithm in Intrusion Detection System[J].,2014,24(07):151.
[3]陶善旗 李俊 郭伟群 李海龙.入侵检测系统中模式匹配算法的研究与改进[J].计算机技术与发展,2010,(02):167.
 TAO Shan-qi,LI Jun,GUO Wei-qun,et al.Research and Improvement of Pattern Matching Algorithm for Intrusion Detection System[J].,2010,(07):167.
[4]林倩瑜 冯少荣 张东站.基于神经网络和模式匹配的股票预测研究[J].计算机技术与发展,2010,(05):17.
 LIN Qian-yu,FENG Shao-rong,ZHANG Dong-zhan.Stock Market Forecasting Research Based on Neural Network and Pattern Matching[J].,2010,(07):17.
[5]王艳敏 谢强 丁秋林.基于本体和Web Services的数据交换平台[J].计算机技术与发展,2010,(05):112.
 WANG Yan-min,XIE Qiang,DING Qiu-lin.Data Exchange Platform Based on Ontology and Web Services[J].,2010,(07):112.
[6]高峥 陈蜀宇 李国勇.混合入侵检测系统的研究[J].计算机技术与发展,2010,(06):148.
 GAO Zheng,CHEN Shu-yu,LI Guo-yong.Research of a Hybrid Intrusion Detection System[J].,2010,(07):148.
[7]林英 张雁 欧阳佳.日志检测技术在计算机取证中的应用[J].计算机技术与发展,2010,(06):254.
 LIN Ying,ZHANG Yan,OU Yang-jia.Application of Log Testing Technology in Computer Forensics[J].,2010,(07):254.
[8]李钦 余谅.基于免疫遗传算法的网格入侵检测模型[J].计算机技术与发展,2009,(05):162.
 LI Qin,YU Liang.Grid Intrusion Detection Model Based on Immune Genetic Algorithm[J].,2009,(07):162.
[9]黄世权.网络存储安全分析[J].计算机技术与发展,2009,(05):170.
 HUANG Shi-quan.Analysis of Network Storage's Safety[J].,2009,(07):170.
[10]李睿 肖维民.基于孤立点挖掘的异常检测研究[J].计算机技术与发展,2009,(06):168.
 LI Rui,XIAO Wei-min.Research on Anomaly Intrusion Detection Based on Outlier Mining[J].,2009,(07):168.
[11]段丹青 陈松乔 杨卫平.融合漏洞扫描的入侵检测系统模型的研究[J].计算机技术与发展,2006,(05):131.
 DUAN Dan-qing,CHEN Song-qiao,YANG Wei-ping.An Intrusion Detection System Model Merged Vulnerability Scanner[J].,2006,(07):131.
[12]薛传庆 韩明畅 金伟信.入侵检测系统中BM算法的改进[J].计算机技术与发展,2011,(06):136.
 XUE Chuan-qing,HAN Ming-chang,JIN Wei-xin.Improvement of BM Algorithm in Intrusion Detection System[J].,2011,(07):136.

备注/Memo

备注/Memo:
江苏省高校自然科学研究基金项目(04KJB520095)甘学士(1981-),男,四川资中人,硕士研究生,研究方向为入侵检测孙力娟,教授,研究方向为智能优化技术、入侵检测
更新日期/Last Update: 1900-01-01