A survey of pattern matching algorithm in intrusion detection system
The most common method of IDS functioning is based on pattern matching which recognizes the vandalism occurring on the network using particular patterns and rules. In order to do so, normal behaviors of the network are modeled and then used as a base pattern for recognizing abnormal behavior of the...
Saved in:
| Published in | 2014 7th International Symposium on Telecommunications (IST) pp. 946 - 953 |
|---|---|
| Main Authors | , , |
| Format | Conference Proceeding |
| Language | English |
| Published |
IEEE
01.09.2014
|
| Subjects | |
| Online Access | Get full text |
| DOI | 10.1109/ISTEL.2014.7000839 |
Cover
| Abstract | The most common method of IDS functioning is based on pattern matching which recognizes the vandalism occurring on the network using particular patterns and rules. In order to do so, normal behaviors of the network are modeled and then used as a base pattern for recognizing abnormal behavior of the network. The article, in hand, tries to recognize and choose the best algorithms for this operation by surveying, implementing and also collecting all kinds of pattern matching methods so that the best conclusion is reached during matching known attacks with main patterns. In this paper, to collect all algorithms related to the subject, we investigated the discussion of pattern compatibility operation from different aspects. Another aspect studied in this paper is to determine the indexes for grouping the algorithms, meaning the algorithms were classified based on important indexes which more effect on the performance of pattern compatibility operations. |
|---|---|
| AbstractList | The most common method of IDS functioning is based on pattern matching which recognizes the vandalism occurring on the network using particular patterns and rules. In order to do so, normal behaviors of the network are modeled and then used as a base pattern for recognizing abnormal behavior of the network. The article, in hand, tries to recognize and choose the best algorithms for this operation by surveying, implementing and also collecting all kinds of pattern matching methods so that the best conclusion is reached during matching known attacks with main patterns. In this paper, to collect all algorithms related to the subject, we investigated the discussion of pattern compatibility operation from different aspects. Another aspect studied in this paper is to determine the indexes for grouping the algorithms, meaning the algorithms were classified based on important indexes which more effect on the performance of pattern compatibility operations. |
| Author | Monsefan, Nima Seifi, Shokoufeh Gharaee, Hossein |
| Author_xml | – sequence: 1 givenname: Hossein surname: Gharaee fullname: Gharaee, Hossein organization: IRAN Telecom Research Center (ITRC) Tehran, Iran – sequence: 2 givenname: Shokoufeh surname: Seifi fullname: Seifi, Shokoufeh organization: Department of Computer Engineering, University Of Tehran Kish International Campus, Tehran, Iran – sequence: 3 givenname: Nima surname: Monsefan fullname: Monsefan, Nima organization: Department of Computer Engineering, University Of Tehran Kish International Campus, Tehran, Iran |
| BookMark | eNotT1FLwzAYjKCgzv4BfckfaM2Xr02axzGnDgo-OJ9H2n7dIms6mkzov7fi4OCOOzju7tm1Hzwx9ggiAxDmefO5XVeZFJBnWghRorliidEl5NqYAgsjb1kSwvecgZk9xDv2suThPP7QxIeOn2yMNHre29gcnN9ze9wPo4uHnjs_I47n4AbPW4rUxD8VphCpf2A3nT0GSi68YF-v6-3qPa0-3jarZZU6mUNMla2VtgU0bam6luZJUnUoQedYSiST16Ixpap1IZWGxtoWLBoE0kojAeGCPf33OiLanUbX23HaXb7iL1GBS-0 |
| ContentType | Conference Proceeding |
| DBID | 6IE 6IL CBEJK RIE RIL |
| DOI | 10.1109/ISTEL.2014.7000839 |
| DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Xplore POP ALL IEEE Xplore All Conference Proceedings IEL(IEEE/IET Electronic Library ) IEEE Proceedings Order Plans (POP All) 1998-Present |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISBN | 9781479953592 1479953598 147995358X 9781479953585 |
| EndPage | 953 |
| ExternalDocumentID | 7000839 |
| Genre | orig-research |
| GroupedDBID | 6IE 6IF 6IK 6IL 6IN AAJGR AAWTH ADFMO ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK IEGSK IERZE OCL RIE RIL |
| ID | FETCH-LOGICAL-i241t-6ab67a51cd86fde95326f321743823e94b0c986b752671caad1a3931e7673e1e3 |
| IEDL.DBID | RIE |
| IngestDate | Wed Aug 27 04:44:37 EDT 2025 |
| IsPeerReviewed | false |
| IsScholarly | false |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-i241t-6ab67a51cd86fde95326f321743823e94b0c986b752671caad1a3931e7673e1e3 |
| PageCount | 8 |
| ParticipantIDs | ieee_primary_7000839 |
| PublicationCentury | 2000 |
| PublicationDate | 2014-09 |
| PublicationDateYYYYMMDD | 2014-09-01 |
| PublicationDate_xml | – month: 09 year: 2014 text: 2014-09 |
| PublicationDecade | 2010 |
| PublicationTitle | 2014 7th International Symposium on Telecommunications (IST) |
| PublicationTitleAbbrev | ISTEL |
| PublicationYear | 2014 |
| Publisher | IEEE |
| Publisher_xml | – name: IEEE |
| SSID | ssj0001947933 |
| Score | 1.5675365 |
| Snippet | The most common method of IDS functioning is based on pattern matching which recognizes the vandalism occurring on the network using particular patterns and... |
| SourceID | ieee |
| SourceType | Publisher |
| StartPage | 946 |
| SubjectTerms | Algorithm design and analysis Classification algorithms Clustering algorithms Indexes Intrusion detection intrusion detection systems Pattern matching search algorithms Time complexity |
| Title | A survey of pattern matching algorithm in intrusion detection system |
| URI | https://ieeexplore.ieee.org/document/7000839 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1JSwMxFA5tT3pxacWdHDw608lkmclRtKWKFcEWeitJ5o0WdabUqaC_3kymi4oHIYQQCFne4b28fN8XhM4CCCGUjHgAnHqMhMbTcag8rQNKNSOMxCXfuX8nekN2M-KjGjpfcWEAwIHPwC-b7i0_yc28TJW1IxcxyDqqR7GouFrrfIosc0R0yYsJZPv6YdC5LcFbzF8M_PGDinMg3S3UX05d4Uae_XmhffP5S5Xxv2vbRq01VQ_fr5zQDqpBtos2v6kMNtHVBX6bz97hA-cpnjo9zQzbQNWhKLF6ecxnk-LpFU8yW0oOhjUVTqBwIK0MV1rPLTTsdgaXPW_xeYI3sU658ITSIlKcmCQWaQKS2zgtpe4CEocUJNOBkbHQEQ9FRIxSCVFUUgKRiCgQoHuokeUZ7CMsSGxCaSsFnGkuZMJkqklKjAk4RPoANcvzGE8rfYzx4igO_-4-QhulTSqc1jFq2H3BiXXshT51Fv0ChJajPQ |
| linkProvider | IEEE |
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1JSwMxFA61HtSLSyvu5uDRaSeTZSZH0ZZW2yLYQm9lknmjRZ0pdSrorzeT6aLiQQghBEKWd3gvL9_3BaELFzzwJCMOAKcOI552VOCFjlIupYoRRoKc79ztidaA3Q75sIQul1wYALDgM6jlTfuWH6V6lqfK6r6NGOQaWueMMV6wtVYZFZlnieiCGePKevuh3-jk8C1Wmw_98YeKdSHNbdRdTF4gR55rs0zV9OcvXcb_rm4HVVdkPXy_dEO7qATJHtr6pjNYQTdX-G02fYcPnMZ4YhU1E2xCVYujxOHLYzodZ0-veJyYkrMwjLFwBJmFaSW4UHuuokGz0b9uOfPvE5yxccuZI0Il_JATHQUijkByE6nF1F5BAo-CZMrVMhDK557wiQ7DiIRUUgK-8CkQoPuonKQJHCAsSKA9aaoQOFNcyIjJWJGYaO1y8NUhquTnMZoUChmj-VEc_d19jjZa_W5n1Gn37o7RZm6fArV1gspmj3Bq3Hymzqx1vwBBEKaK |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2014+7th+International+Symposium+on+Telecommunications+%28IST%29&rft.atitle=A+survey+of+pattern+matching+algorithm+in+intrusion+detection+system&rft.au=Gharaee%2C+Hossein&rft.au=Seifi%2C+Shokoufeh&rft.au=Monsefan%2C+Nima&rft.date=2014-09-01&rft.pub=IEEE&rft.spage=946&rft.epage=953&rft_id=info:doi/10.1109%2FISTEL.2014.7000839&rft.externalDocID=7000839 |