[1]薛传庆 韩明畅 金伟信.入侵检测系统中BM算法的改进[J].计算机技术与发展,2011,(06):136-139.
 XUE Chuan-qing,HAN Ming-chang,JIN Wei-xin.Improvement of BM Algorithm in Intrusion Detection System[J].,2011,(06):136-139.
点击复制

入侵检测系统中BM算法的改进()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
期数:
2011年06期
页码:
136-139
栏目:
安全与防范
出版日期:
1900-01-01

文章信息/Info

Title:
Improvement of BM Algorithm in Intrusion Detection System
文章编号:
1673-629X(2011)06-0136-04
作者:
薛传庆1 韩明畅2 金伟信2
[1]解放军理工大学通信工程学院[2]中国电子系统设备工程公司安全保密中心
Author(s):
XUE Chuan-qingHAN Ming-changJIN Wei-xin
[1]Institute of Communication Engineering,People's Liberation Army University of Technology[2]Security Research Center,China Electronic Equipment System Engineering Company
关键词:
入侵检测模式匹配BM算法模式串
Keywords:
invading detection pattern matching BM algorithm pattern string
分类号:
TP393.08
文献标志码:
A
摘要:
随着网络安全问题的日益突出,入侵检测技术也成为当前研究的热点,模式匹配算法是入侵检测系统(IDS)中一种重要算法,直接影响到系统的准确性和实时性。在研究BM算法和分析现有改进算法的基础上,提出了一种新的改进算法。该算法利用了末字符和下一个字符在模式串中首次出现的位置、存在性、唯一性的判断来增加模式串移动距离,利用记录因子记录上次匹配过程中的匹配后缀来减少比较次数,从而有效地加快模式匹配的速度,提高入侵检测的效率
Abstract:
With the online security especially the invading detection technique is becoming a hot topic.Pattern matching algorithm is an important method in intrusion detection system(IDS) which directly influences the accuracy and real-time performance of the system.In this paper,on base of researching BM algorithm and analyzing other improved algorithms,a new improvement algorithm is proposed.The algorithm can increase the shift distance by making use of the first position,judged the existence and the uniqueness of the last character and next character of the pattern string,and it can decrease the comparison times by the memory a factor the last match record in the process of matching the suffix.In this way,the new algorithm improves the match speed and the efficiency of the intrusion detection system

相似文献/References:

[1]李雷 丁亚丽 罗红旗.基于规则约束制导的入侵检测研究[J].计算机技术与发展,2010,(03):143.
 LI Lei,DING Ya-li,LUO Hong-qi.Intrusion Detection Technology Research Based on Homing - Constraint Rule[J].,2010,(06):143.
[2]马志远,曹宝香.改进的决策树算法在入侵检测中的应用[J].计算机技术与发展,2014,24(01):151.
 MA Zhi-yuan,CAO Bao-xiang.Application of Improved Decision Tree Algorithm in Intrusion Detection System[J].,2014,24(06):151.
[3]陶善旗 李俊 郭伟群 李海龙.入侵检测系统中模式匹配算法的研究与改进[J].计算机技术与发展,2010,(02):167.
 TAO Shan-qi,LI Jun,GUO Wei-qun,et al.Research and Improvement of Pattern Matching Algorithm for Intrusion Detection System[J].,2010,(06):167.
[4]林倩瑜 冯少荣 张东站.基于神经网络和模式匹配的股票预测研究[J].计算机技术与发展,2010,(05):17.
 LIN Qian-yu,FENG Shao-rong,ZHANG Dong-zhan.Stock Market Forecasting Research Based on Neural Network and Pattern Matching[J].,2010,(06):17.
[5]王艳敏 谢强 丁秋林.基于本体和Web Services的数据交换平台[J].计算机技术与发展,2010,(05):112.
 WANG Yan-min,XIE Qiang,DING Qiu-lin.Data Exchange Platform Based on Ontology and Web Services[J].,2010,(06):112.
[6]高峥 陈蜀宇 李国勇.混合入侵检测系统的研究[J].计算机技术与发展,2010,(06):148.
 GAO Zheng,CHEN Shu-yu,LI Guo-yong.Research of a Hybrid Intrusion Detection System[J].,2010,(06):148.
[7]林英 张雁 欧阳佳.日志检测技术在计算机取证中的应用[J].计算机技术与发展,2010,(06):254.
 LIN Ying,ZHANG Yan,OU Yang-jia.Application of Log Testing Technology in Computer Forensics[J].,2010,(06):254.
[8]李钦 余谅.基于免疫遗传算法的网格入侵检测模型[J].计算机技术与发展,2009,(05):162.
 LI Qin,YU Liang.Grid Intrusion Detection Model Based on Immune Genetic Algorithm[J].,2009,(06):162.
[9]黄世权.网络存储安全分析[J].计算机技术与发展,2009,(05):170.
 HUANG Shi-quan.Analysis of Network Storage's Safety[J].,2009,(06):170.
[10]李睿 肖维民.基于孤立点挖掘的异常检测研究[J].计算机技术与发展,2009,(06):168.
 LI Rui,XIAO Wei-min.Research on Anomaly Intrusion Detection Based on Outlier Mining[J].,2009,(06):168.
[11]段丹青 陈松乔 杨卫平.融合漏洞扫描的入侵检测系统模型的研究[J].计算机技术与发展,2006,(05):131.
 DUAN Dan-qing,CHEN Song-qiao,YANG Wei-ping.An Intrusion Detection System Model Merged Vulnerability Scanner[J].,2006,(06):131.
[12]甘学士 孙力娟.改进的模式匹配算法及在入侵检测中的应用[J].计算机技术与发展,2006,(07):150.
 GAN Xue-shi,SUN Li-juan.An Improved Algorithm for Pattern Matching and Its Application Intrusion Detection System[J].,2006,(06):150.

备注/Memo

备注/Memo:
总装备部科研计划项目(20091315)薛传庆(1983-),男,江苏淮安人,硕士,研究方向为网络安全;金伟信,高级工程师,硕士,研究方向为网络安全
更新日期/Last Update: 1900-01-01