透過您的圖書館登入
IP:3.145.130.31
  • 學位論文

用於入侵偵測系統的兩階段正規表示式比對方法

Two-Phase Pattern Matching for Regular Expressions in Intrusion Detection Systems

指導教授 : 王勝德

摘要


網路安全近年來已經被當成一項重要的議題,同時也發展了相當多種類的網路入侵偵測系統,這些偵測系統為了描述一些有可能造成安全威脅的特徵樣式,大部分都開始使用正規表示式。傳統上我們可以使用能力等同於這些正規表示式的有限自動機來辨識網路封包的資訊,而在多種有限狀態機的實現方法中,由於系統需要較快的處理速度以及隨時線上更新的能力,我們通常會選擇一種只需要執行單次掃描並以記憶體查表結果來決定下次狀態轉移的確定性有限狀態機來實現,但是此種實現方法在碰到“.*A. {N}B”類型的樣式時,會遭遇比對時需要的狀態數目太過巨大的問題。 本論文將探討現今網路的入侵偵測系統,討論範圍包括此種類型樣式的存在,以及造成狀態數劇烈增加的原因;並且進一步提出兩階段的正規表示式比對方法,預期解決這種樣式所引發的問題。兩階段的正規表示式比對方法可以將比對所需要的狀態數,從正比於重複限制數N的指數複雜度化約成線性複雜度,因此,使用我們的方法做為傳統確定性有限狀態機的輔助辨識器,能使上述的有限狀態機實現方法可以實作於現有的記憶體空間。另外,我們使用可現場規劃的邏輯陣列來實作這個輔助辨識器,可達每秒鐘處理超過十億位元的比對速度。

並列摘要


Recently, network security has become an important issue. Agood number of network intrusion detection (NID) systems are employed to detect potential attacks. Some NID systems may use regular expressions to describe the signatures of security threats. Traditionally, we can build finite-state automata corresponding to these regular expressions to identify the suspicious packets. Because of the high speed and update ability, the memory-based deterministic finite-state automata(DFA) with one-pass-scanning model are desirable for NID systems. However in practical implementations, there are some signature patterns that can cause the state explosion problem when applying this model. A prototype of these signature patterns is “.*A.{N}B”. In this thesis, we first argue that the state explosion problem does exist in the common signature patterns of an NID system. Then we propose a two-phase matching approach for regular expressions to solve the state explosion problem. It reduces the state storage cost from the exponential complexity to linear complexity with respect to N. By applying this approach as a co-processing unit with the traditional DFA, the memory-based DFA approaches can be achieved in practice. We also implement the two-phase matching engine, which is called TPME unit, in a field programmable gate array(FPGA) and the throughput of the pattern matching process can achieve over 1.86 gigabits per second.

參考文獻


[1] Bro intrusion detection system. http://www.bro-ids.org/.
[3] Pcre - perl compatible regular expressions. http://www.pcre.org/.
[5] A. V. Aho and M. J. Corasick. Efficient string matching: An aid to bibliographic search. Communications of the ACM, 1975.
[6] M. Aldwairi, T. Conte, and P. Franzon. Configurable string matching hardware for speeding up intrusion detection. SIGARCH Comput. Archit. News, 33(1):99-107, 2005.
[7] S. Antonatos, K. G. Anagnostakis, and E. P. Markatos. Generating realistic workloads for network intrusion detection systems. SIGSOFT Softw. Eng. Notes, 29(1):207-215, 2004.

延伸閱讀