skip to main content
10.1145/1364654.1364656acmconferencesArticle/Chapter ViewAbstractPublication PagesconextConference Proceedingsconference-collections
research-article

A hybrid finite automaton for practical deep packet inspection

Published:10 December 2007Publication History

ABSTRACT

Deterministic finite automata (DFAs) are widely used to perform regular expression matching in linear time. Several techniques have been proposed to compress DFAs in order to reduce memory requirements. Unfortunately, many real-world IDS regular expressions include complex terms that result in an exponential increase in number of DFA states. Since all recent proposals use an initial DFA as a starting-point, they cannot be used as comprehensive regular expression representations in an IDS.

In this work we propose a hybrid automaton which addresses this issue by combining the benefits of deterministic and non-deterministic finite automata. We test our proposal on Snort rule-sets and we validate it on real traffic traces. Finally, we address and analyze the worst case behavior of our scheme and compare it to traditional ones.

References

  1. A. V. Aho and M. J. Corasick, "Efficient String Matching: An Aid to Bibliographic Search," Communications of the ACM, pp. 333--340, 1975. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. B. Commentz-Walter, "A string matching algorithm fast on the average," in ICALP, July 1979. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. S. Wu, U. Manber, "A fast algorithm for multi-pattern searching," Tech. Report TR-94-17, Univ of Arizona, 1994.Google ScholarGoogle Scholar
  4. J. E. Hopcroft and J. D. Ullman, "Introduction to Automata Theory, Languages, and Computation," Addison Wesley, 1979. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. J. Hopcroft, "An nlogn algorithm for minimizing states in a finite automaton," in Theory of Machines and Computation, J. Kohavi, Ed. New York: Academic, 1971, pp. 189--196.Google ScholarGoogle Scholar
  6. M. Roesch, "Snort: Lightweight Intrusion Detection for Networks," in System Administration Conf., 1999 Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Snort: http://www.Snort.org/Google ScholarGoogle Scholar
  8. Cisco Systems. Cisco ASA 5505 Adaptive Security Appliance. http://www.cisco.com.2007.Google ScholarGoogle Scholar
  9. Citrix Systems. Citrix Application Firewall. http://www.citrix.com. 2007.Google ScholarGoogle Scholar
  10. Bro: http://bro-ids.org/Google ScholarGoogle Scholar
  11. Vern Paxson et al., "Flex: A fast scanner generator," http://www.gnu.org/software/flex/Google ScholarGoogle Scholar
  12. R. Sommer and V. Paxson, "Enhancing byte-level network intrusion detection signatures with context.", in CCS 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. N. Tuck, T. Sherwood, B. Calder, and G. Varghese, "Deterministic memory-efficient string matching algorithms for intrusion detection," in Infocom 2004.Google ScholarGoogle Scholar
  14. L. Tan, and T. Sherwood, "A High Throughput String Matching Architecture for Intrusion Detection and Prevention," ISCA 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. F. Yu, Z. Chen, Y. Diao, T. V. Lakshman, and R. H. Katz, "Fast and Memory-Efficient Regular Expression Matching for Deep Packet Inspection", in ANCS 2006 Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. S. Kumar et alt., "Algorithms to Accelerate Multiple Regular Expressions Matching for Deep Packet Inspection," in ACM SIGCOMM, Sept 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. S. Kumar, et alt, "Advanced Algorithms for Fast and Scalable Deep Packet Inspection", in ANCS 2006 Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. M. Becchi and S. Cadambi, "Memory-Efficient Regular Expression Search Using State Merging", in INFOCOM 2007Google ScholarGoogle Scholar
  19. M. Becchi and P. Crowley, "An Improved Algorithm to Accelerate Regular Expression Evaluation", in ANCS 2007 Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. M. Becchi and P. Crowley, "Addressing complex regular expressions through counting automata", Washington University Tech. Report, July 2007.Google ScholarGoogle Scholar
  21. R. W. Floyd, and J. D. Ullman, "The Compilation of Regular Expressions into Integrated Circuits", Journal of ACM, vol. 29, no. 3, pp 603--622, July 1982. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. R. Sidhu and V. K. Prasanna, "Fast Regular Expression Matching using FPGAs", in FCCM 2001 Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. C. R. Clark and D. E. Schimmel, "Efficient reconfigurable logic circuit for matching complex network intrusion detection patterns," in FLP 2003.Google ScholarGoogle Scholar
  24. J. Moscola et alt., "Implementation of a content-scanning module for an internet firewall," in FCCM, USA, April 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Internet traffic traces: http://cctf.shmoo.com/Google ScholarGoogle Scholar
  26. Cu-11 standard cell/gate array ASIC, IBM. www.ibm.comGoogle ScholarGoogle Scholar

Index Terms

  1. A hybrid finite automaton for practical deep packet inspection

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      CoNEXT '07: Proceedings of the 2007 ACM CoNEXT conference
      December 2007
      448 pages
      ISBN:9781595937704
      DOI:10.1145/1364654

      Copyright © 2007 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 10 December 2007

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate198of789submissions,25%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader