Hardware Efficient Pattern Matching Algorithms and Architectures for Fast Intrusion Detection.

dc.contributor.advisorDr Paul Franzon, Committee Chairen_US
dc.contributor.authorAldwairi, Montheren_US
dc.date.accessioned2010-04-02T18:32:03Z
dc.date.available2010-04-02T18:32:03Z
dc.date.issued2006-12-08en_US
dc.degree.disciplineComputer Engineeringen_US
dc.degree.leveldissertationen_US
dc.degree.namePhDen_US
dc.description.abstractIntrusion detection processors are becoming a predominant feature in the field of network hardware. As demand on more network speed increases and new network protocols emerge, network intrusion detection systems are increasing in importance and are being integrated in network processors. Currently, most intrusion detection systems are software running on a general purpose processor. Unfortunately, it is becoming increasingly difficult for software based intrusion detection systems to keep up with increasing network speeds (OC192 and 10Gbps at backbone networks). Signature-based intrusion detection systems monitor network traffic for security threats by scanning packet payloads for attack signatures. Intrusion detection systems have to run at wire speed and need to be configurable to protect against emerging attacks. This dissertation describes the concept, structure and algorithms for a special purpose hardware accelerator designed to meet those demands. We consider the problem of string matching which is the most computationally intensive task in intrusion detection. A configurable string matching accelerator is developed with the focus on increasing throughput while maintaining the configurability provided by the software intrusion detection systems. A hardware algorithm for efficient data storage and fast retrieval is used to compress, store and retrieve attack signatures. Our algorithms reduce the size of the rules to fit on chip and enables intrusion detection to run at line rates and faster.en_US
dc.identifier.otheretd-12072006-052347en_US
dc.identifier.urihttp://www.lib.ncsu.edu/resolver/1840.16/3558
dc.rightsI hereby certify that, if appropriate, I have obtained and attached hereto a written permission statement from the owner(s) of each third party copyrighted matter to be included in my thesis, dis sertation, or project report, allowing distribution as specified below. I certify that the version I submitted is the same as that approved by my advisory committee. I hereby grant to NC State University or its agents the non-exclusive license to archive and make accessible, under the conditions specified below, my thesis, dissertation, or project report in whole or in part in all forms of media, now or hereafter known. I retain all other ownership rights to the copyright of the thesis, dissertation or project report. I also retain the right to use in future works (such as articles or books) all or part of this thesis, dissertation, or project report.en_US
dc.subjectDigital ASIC Designen_US
dc.subjectNetwork Processorsen_US
dc.subjectNetwork Securityen_US
dc.subjectString Matchingen_US
dc.subjectFPGAen_US
dc.subjectHardware Algorithmsen_US
dc.subjectCompression Algorithmsen_US
dc.subjectPattern Matchingen_US
dc.subjectSnorten_US
dc.subjectIntrusion Detection Systemsen_US
dc.titleHardware Efficient Pattern Matching Algorithms and Architectures for Fast Intrusion Detection.en_US

Files

Original bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
etd.pdf
Size:
750.45 KB
Format:
Adobe Portable Document Format

Collections