Constraint repetition inspection for regular expression on FPGA

M Faezipour, M Nourani - 2008 16th IEEE Symposium on High …, 2008 - ieeexplore.ieee.org
2008 16th IEEE Symposium on High Performance Interconnects, 2008ieeexplore.ieee.org
Recent network intrusion detection systems (NIDS) use regular expressions to represent
suspicious or malicious character sequences in packet payloads in a more efficient way.
This paper introduces a new basic building block based on non-deterministic finite automata
(NFA) hardware implementation to support complex constraint repetitions in regular
expressions. This block is a customized counter capable of handling any type of constraint
repetition, applicable to any sub-regular expression. We also introduce optimization …
Recent network intrusion detection systems (NIDS) use regular expressions to represent suspicious or malicious character sequences in packet payloads in a more efficient way. This paper introduces a new basic building block based on non-deterministic finite automata (NFA) hardware implementation to support complex constraint repetitions in regular expressions. This block is a customized counter capable of handling any type of constraint repetition, applicable to any sub-regular expression. We also introduce optimization techniques to reduce the area and improve the overall performance. We have implemented SNORT IDS regular expressions in hardware by taking advantage of the basic NFA building blocks, our proposed counting block and our proposed optimization techniques. We report experimental results for our architecture that verify area saving and performance improvement.
ieeexplore.ieee.org
顯示最佳搜尋結果。 查看所有結果