Affiliation:
1. Washington University
2. University of California, Berkeley
Abstract
There is a growing demand for network devices capable of examining the content of data packets in order to improve network security and provide application-specific services. Most high performance systems that perform deep packet inspection implement simple string matching algorithms to match packets against a large, but finite set of strings. owever, there is growing interest in the use of regular expression-based pattern matching, since regular expressions offer superior expressive power and flexibility. Deterministic finite automata (DFA) representations are typically used to implement regular expressions. However, DFA representations of regular expression sets arising in network applications require large amounts of memory, limiting their practical application.In this paper, we introduce a new representation for regular expressions, called the
Delayed Input
DFA (D
2
FA), which substantially reduces space equirements as compared to a DFA. A D
2
FA is constructed by transforming a DFA via incrementally replacing several transitions of the automaton with a single default transition. Our approach dramatically reduces the number of distinct transitions between states. For a collection of regular expressions drawn from current commercial and academic systems, a D2FA representation reduces transitions by more than 95%. Given the substantially reduced space equirements, we describe an efficient architecture that can perform deep packet inspection at multi-gigabit rates. Our architecture uses multiple on-chip memories in such a way that each remains uniformly occupied and accessed over a short duration, thus effectively distributing the load and enabling high throughput. Our architecture can provide ostffective packet content scanning at OC-192 rates with memory requirements that are consistent with current ASIC technology.
Publisher
Association for Computing Machinery (ACM)
Subject
Computer Networks and Communications,Software
Reference39 articles.
1. Enhancing byte-level network intrusion detection signatures with context
2. J. E. Hopcroft and J. D. Ullman "Introduction to Automata Theory Languages and Computation " Addison Wesley 1979. J. E. Hopcroft and J. D. Ullman "Introduction to Automata Theory Languages and Computation " Addison Wesley 1979.
3. An nlogn algorithm for minimizing states in a finite automaton," in Theory of Machines and Computation, J. Kohavi;Hopcroft J.;Ed. New York: Academic,1971
4. Bro: A System for Detecting Network Intruders in Real-Time. http://www.icir.org/vern/bro-info.html Bro: A System for Detecting Network Intruders in Real-Time. http://www.icir.org/vern/bro-info.html
Cited by
207 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献