Skip navigation

DSpace

機構典藏 DSpace 系統致力於保存各式數位資料(如:文字、圖片、PDF)並使其易於取用。

點此認識 DSpace
DSpace logo
English
中文
  • 瀏覽論文
    • 校院系所
    • 出版年
    • 作者
    • 標題
    • 關鍵字
    • 指導教授
  • 搜尋 TDR
  • 授權 Q&A
    • 我的頁面
    • 接受 E-mail 通知
    • 編輯個人資料
  1. NTU Theses and Dissertations Repository
  2. 電機資訊學院
  3. 電機工程學系
請用此 Handle URI 來引用此文件: http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/47772
完整後設資料紀錄
DC 欄位值語言
dc.contributor.advisor顏嗣鈞
dc.contributor.authorChia-Ming Changen
dc.contributor.author張家銘zh_TW
dc.date.accessioned2021-06-15T06:17:42Z-
dc.date.available2015-08-18
dc.date.copyright2010-08-18
dc.date.issued2010
dc.date.submitted2010-08-10
dc.identifier.citation[1] M. Roesch, “Snort – lightweight intrusion detection for networks,” Proceedings of the 13th Systems Administration Conference, USENIX, 1999.
[2] V. Paxson, “Bro: a system for detecting network intruders in real-time,” Computer Networks, volume 31, pp. 2435-3463, 1999.
[3] A. Aho and M. Corasick, “Efficient string matching: An aid to bibliographic search,” Communications of the ACM, June 1975.
[4] R. Boyer and J. Moore, “A fast string searching algorithm,” Communications of the ACM, volume 20, October 1977.
[5] C. Coit, S. Staniford, and J. McAlerney, “Towards faster pattern matching for intrusion detection or exceeding the speed of Snort,” 2nd DARPA Information Survivability Conference and Exposition, June 2001.
[6] M. Fisk and G. Varghese, “Fast content-based packet handling for intrusion detection,” TR CS2001-0670, UC San Diego, May 2001.
[7] R Liu, N Huang, C Chen, and C Kao, “A fast string-matching algorithm for network processor-based intrusion detection system,” Transactions on Embedded Computing Sys., volume 3, pp. 614-633, August 2004.
[8] I. Sourdis and D. Pnevmatikatos, “Fast, latge-scale string match for a 10gbps fpga-based network intrusion detection system,” International Conference on Field Programmable Logic and Applications, September 2003.
[9] L. Tan and T. Sherwood, “A high throughput string matching architecture for intrusion detection and prevention,” International Symposium on Computer Architecture, June 2005.
[10] T. Ptacek and T. Newsham, “Insertion, evasion and denial of service: Eluding network intrusion detection,” Secure Networks, Inc., January 1998.
[11] D. Brumley, J. Newsome, D. Song, H. Wang, and S. Jha, “Towards automatic generation of vulnerability-based signatures,” IEEE Symposium on Security and Privacy, May 2006.
[12] H. Wang, C. Guo, D. Simon, and A. Zugenmaier, “Shield: Vulnerability-driven network filters for preventing known vulnerability exploits,” Proceedings of the 2004 ACM SIGCOMM Conference, August 2004.
[13] S. Rubin, S. Jha, and B. Miller, “Language-based generation and evaluation of NIDS signatures,” IEEE Symposium on Security and Privacy, May 2005.
[14] R. Sommer and V. Paxson, “Enhancing byte-level network intrusion detection signatures with context,” ACM Conference on Computer and Communications Security, 2003.
[15] S. Kumar, S. Dharmapurikar, F. Yu, P. Crowley, and J. Turner, “Algorithms to accelerate multiple regular expressions matching for deep packet inspection,” proceedings of ACM SIGCOMM, September 2006.
[16] S. Crosby, “Denial of service through regular expressions,” Usenix Security work in progress report, August 2003.
[17] R. Sidhu and V. Prasanna, “Fast regular expression matching using FPGAs,” Field-Programmable Custom Computing Machines, April 2001.
[18] C. Clark and D. Schimmel, “Scalable pattern matching for high-speed networks,” IEEE Symposium on Field-Programmable Custom Computing Machines, pp. 249-257, April 2004.
[19] I. Sourdis and D. Pnevmatikatos, “Pre-decoded CAMs for efficient and high-speed NIDS pattern matching,” IEEE Symposium on Field-Programmable Custom Computing Machines, April 2004.
[20] R. Smith, C. Estan, and S. Jha, “XFA: Faster Signature Matching With Extended Automata,” IEEE Symposium on Security and Privacy, pp. 187-201, 2008.
[21] F. Yu, Z. Chen, Y. Diao, T. Lakshman, and R. Katz, “Fast and memory-efficient regular expression matching for deep packet inspection,” Proceedings of Architectures for Networking and Communications Systems, pp. 93-102, 2006.
[22] “Vaucanson,” http://www.lrde.epita.fr/cgi-bin/twiki/view/Projects/Vaucanson
[23] K. Thompson, “Programming techniques: Regular expression search algorithm,” Communications of the ACM, Volume 11, pp. 419-422, June 1968.
[24] “MIT DARPA Intrusion Detection Data Sets,” http://www.ll.mit.edu/mission/communications/ist/corpora/ideval/data/index.html
dc.identifier.urihttp://tdr.lib.ntu.edu.tw/jspui/handle/123456789/47772-
dc.description.abstract網際網路在世界上已經普及化且容易使用。為了保護來自網際網路的攻擊,我們需要網路入侵偵測系統。在網路入侵偵測系統的特徵碼比對中,使用自動狀態機為基礎的方法是一個有用的解決辦法。將網路入侵偵測系統的特徵碼表示成決定性的有限自動狀態機可達到非常快速的特徵碼比對,但其需要的記憶體空間卻非常巨大。另一方面,使用非決定性的有限自動狀態機將造成特徵碼比對的速度過慢,雖然它需要的記憶體空間非常小。
在某些論文中,使用變種的有限自動狀態機做網路入侵偵測系統的特徵碼比對已經被提出。舉例來說,使用延展的有限自動狀態機做特徵碼比對是快速的,且記憶體空間的需求也不高,但它需要一個人工設定的步驟且建構一個延展的有限自動狀態機需要花相當多的時間。另一個例子是複合決定性的有限自動狀態機,它提供了一個可以在使用的記憶體空間和特徵碼比對的時間上做調整的機制。在這篇論文中,我們提出了一個使用加權式自動狀態機做網路入侵偵測系統的特徵碼比對的方法,此方法快速且完全自動化。透過使用不同的半環來建構加權式自動狀態機,我們可以調校加權式自動狀態機的效率以及其記憶體使用空間。我們也提出了一些在建構加權式自動狀態機做特徵碼比對時需要用到的演算法。
zh_TW
dc.description.abstractThe Internet has become popular and easy to use for everyone in the world. Network Intrusion Detection Systems (NIDS) are useful for preventing attacks from malicious users. The automata-based solutions are useful for signature matching in NIDS. Representing NIDS signatures as deterministic finite state automata results in very fast matching speed but the memory usage would blowup, on the other hand, using nondeterministic finite state automata to match signatures results in very small memory usage but slow signature matching.
Variant finite state automata have been introduced for signature matching in NIDS in several papers. For example, extended finite automata (XFA) is fast and small memory usage but it needs a manual configuration and large construction time. Another example is multiple-DFA, it provide a mechanism to trade memory usage for time by enforcing an upper bound on the available memory. In this thesis, we introduce another method to match signatures in NIDS by using weighted automata, which is fast and fully automatic. By controlling the semiring of weighted automata we could tune performance and memory usage of the weighted automata. We also provide several algorithms for constructing weighted automata to match signatures.
en
dc.description.provenanceMade available in DSpace on 2021-06-15T06:17:42Z (GMT). No. of bitstreams: 1
ntu-99-R97921058-1.pdf: 1222329 bytes, checksum: 3b7baa19e4aa002d9a41f408f9f12ab6 (MD5)
Previous issue date: 2010
en
dc.description.tableofcontents口試委員會審定書 #
誌謝 i
中文摘要 ii
ABSTRACT iii
CONTENTS iv
LIST OF FIGURES vi
LIST OF TABLES viii
Chapter 1 Introduction 1
Chapter 2 Preliminaries 5
2.1 Regular Expression 5
2.2 Finite State Automata 9
2.2.1 Deterministic Finite State Automata 10
2.2.2 Nondeterministic Finite State Automata 11
2.3 Building a Deterministic Finite State Automaton from a Regular Expression 13
2.4 Weighted Automata 20
2.5 Vaucanson 25
Chapter 3 Using Weighted Automata for Signature Matching 26
3.1 Reducing State Number with Weighted Automata 27
3.2 Annotating Regular Expression 30
3.3 Modified Algorithms 31
3.4 Combining weighted automata 37
3.5 The Option of Semirings 39
Chapter 4 Feasibility Study 42
4.1 Experimental Methodology 42
4.2 Constructing Weighted Automata 43
4.3 Performance and Memory Usage 45
Chapter 5 Conclusion and Future Work 47
REFERENCES 49
dc.language.isoen
dc.subject網路安全zh_TW
dc.subject網路入侵偵測系統zh_TW
dc.subject加權式自動狀態機zh_TW
dc.subjectNetwork Intrusion Detection Systemen
dc.subjectWeighted Automataen
dc.subjectNetwork Securityen
dc.title用加權式自動狀態機做特徵碼比對zh_TW
dc.titleSignature Matching with Weighted Automataen
dc.typeThesis
dc.date.schoolyear98-2
dc.description.degree碩士
dc.contributor.oralexamcommittee雷欽隆,郭斯彥,莊仁輝
dc.subject.keyword網路安全,網路入侵偵測系統,加權式自動狀態機,zh_TW
dc.subject.keywordNetwork Security,Network Intrusion Detection System,Weighted Automata,en
dc.relation.page51
dc.rights.note有償授權
dc.date.accepted2010-08-11
dc.contributor.author-college電機資訊學院zh_TW
dc.contributor.author-dept電機工程學研究所zh_TW
顯示於系所單位:電機工程學系

文件中的檔案:
檔案 大小格式 
ntu-99-1.pdf
  未授權公開取用
1.19 MBAdobe PDF
顯示文件簡單紀錄


系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。

社群連結
聯絡資訊
10617臺北市大安區羅斯福路四段1號
No.1 Sec.4, Roosevelt Rd., Taipei, Taiwan, R.O.C. 106
Tel: (02)33662353
Email: ntuetds@ntu.edu.tw
意見箱
相關連結
館藏目錄
國內圖書館整合查詢 MetaCat
臺大學術典藏 NTU Scholars
臺大圖書館數位典藏館
本站聲明
© NTU Library All Rights Reserved