A survey of pattern matching algorithm in intrusion detection system

The most common method of IDS functioning is based on pattern matching which recognizes the vandalism occurring on the network using particular patterns and rules. In order to do so, normal behaviors of the network are modeled and then used as a base pattern for recognizing abnormal behavior of the...

Full description

Saved in:
Bibliographic Details
Published in2014 7th International Symposium on Telecommunications (IST) pp. 946 - 953
Main Authors Gharaee, Hossein, Seifi, Shokoufeh, Monsefan, Nima
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.09.2014
Subjects
Online AccessGet full text
DOI10.1109/ISTEL.2014.7000839

Cover

Abstract The most common method of IDS functioning is based on pattern matching which recognizes the vandalism occurring on the network using particular patterns and rules. In order to do so, normal behaviors of the network are modeled and then used as a base pattern for recognizing abnormal behavior of the network. The article, in hand, tries to recognize and choose the best algorithms for this operation by surveying, implementing and also collecting all kinds of pattern matching methods so that the best conclusion is reached during matching known attacks with main patterns. In this paper, to collect all algorithms related to the subject, we investigated the discussion of pattern compatibility operation from different aspects. Another aspect studied in this paper is to determine the indexes for grouping the algorithms, meaning the algorithms were classified based on important indexes which more effect on the performance of pattern compatibility operations.
AbstractList The most common method of IDS functioning is based on pattern matching which recognizes the vandalism occurring on the network using particular patterns and rules. In order to do so, normal behaviors of the network are modeled and then used as a base pattern for recognizing abnormal behavior of the network. The article, in hand, tries to recognize and choose the best algorithms for this operation by surveying, implementing and also collecting all kinds of pattern matching methods so that the best conclusion is reached during matching known attacks with main patterns. In this paper, to collect all algorithms related to the subject, we investigated the discussion of pattern compatibility operation from different aspects. Another aspect studied in this paper is to determine the indexes for grouping the algorithms, meaning the algorithms were classified based on important indexes which more effect on the performance of pattern compatibility operations.
Author Monsefan, Nima
Seifi, Shokoufeh
Gharaee, Hossein
Author_xml – sequence: 1
  givenname: Hossein
  surname: Gharaee
  fullname: Gharaee, Hossein
  organization: IRAN Telecom Research Center (ITRC) Tehran, Iran
– sequence: 2
  givenname: Shokoufeh
  surname: Seifi
  fullname: Seifi, Shokoufeh
  organization: Department of Computer Engineering, University Of Tehran Kish International Campus, Tehran, Iran
– sequence: 3
  givenname: Nima
  surname: Monsefan
  fullname: Monsefan, Nima
  organization: Department of Computer Engineering, University Of Tehran Kish International Campus, Tehran, Iran
BookMark eNotT1FLwzAYjKCgzv4BfckfaM2Xr02axzGnDgo-OJ9H2n7dIms6mkzov7fi4OCOOzju7tm1Hzwx9ggiAxDmefO5XVeZFJBnWghRorliidEl5NqYAgsjb1kSwvecgZk9xDv2suThPP7QxIeOn2yMNHre29gcnN9ze9wPo4uHnjs_I47n4AbPW4rUxD8VphCpf2A3nT0GSi68YF-v6-3qPa0-3jarZZU6mUNMla2VtgU0bam6luZJUnUoQedYSiST16Ixpap1IZWGxtoWLBoE0kojAeGCPf33OiLanUbX23HaXb7iL1GBS-0
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/ISTEL.2014.7000839
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Xplore POP ALL
IEEE Xplore All Conference Proceedings
IEL(IEEE/IET Electronic Library )
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISBN 9781479953592
1479953598
147995358X
9781479953585
EndPage 953
ExternalDocumentID 7000839
Genre orig-research
GroupedDBID 6IE
6IF
6IK
6IL
6IN
AAJGR
AAWTH
ADFMO
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
IEGSK
IERZE
OCL
RIE
RIL
ID FETCH-LOGICAL-i241t-6ab67a51cd86fde95326f321743823e94b0c986b752671caad1a3931e7673e1e3
IEDL.DBID RIE
IngestDate Wed Aug 27 04:44:37 EDT 2025
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i241t-6ab67a51cd86fde95326f321743823e94b0c986b752671caad1a3931e7673e1e3
PageCount 8
ParticipantIDs ieee_primary_7000839
PublicationCentury 2000
PublicationDate 2014-09
PublicationDateYYYYMMDD 2014-09-01
PublicationDate_xml – month: 09
  year: 2014
  text: 2014-09
PublicationDecade 2010
PublicationTitle 2014 7th International Symposium on Telecommunications (IST)
PublicationTitleAbbrev ISTEL
PublicationYear 2014
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0001947933
Score 1.5675365
Snippet The most common method of IDS functioning is based on pattern matching which recognizes the vandalism occurring on the network using particular patterns and...
SourceID ieee
SourceType Publisher
StartPage 946
SubjectTerms Algorithm design and analysis
Classification algorithms
Clustering algorithms
Indexes
Intrusion detection
intrusion detection systems
Pattern matching
search algorithms
Time complexity
Title A survey of pattern matching algorithm in intrusion detection system
URI https://ieeexplore.ieee.org/document/7000839
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1JSwMxFA5tT3pxacWdHDw608lkmclRtKWKFcEWeitJ5o0WdabUqaC_3kymi4oHIYQQCFne4b28fN8XhM4CCCGUjHgAnHqMhMbTcag8rQNKNSOMxCXfuX8nekN2M-KjGjpfcWEAwIHPwC-b7i0_yc28TJW1IxcxyDqqR7GouFrrfIosc0R0yYsJZPv6YdC5LcFbzF8M_PGDinMg3S3UX05d4Uae_XmhffP5S5Xxv2vbRq01VQ_fr5zQDqpBtos2v6kMNtHVBX6bz97hA-cpnjo9zQzbQNWhKLF6ecxnk-LpFU8yW0oOhjUVTqBwIK0MV1rPLTTsdgaXPW_xeYI3sU658ITSIlKcmCQWaQKS2zgtpe4CEocUJNOBkbHQEQ9FRIxSCVFUUgKRiCgQoHuokeUZ7CMsSGxCaSsFnGkuZMJkqklKjAk4RPoANcvzGE8rfYzx4igO_-4-QhulTSqc1jFq2H3BiXXshT51Fv0ChJajPQ
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1JSwMxFA61HtSLSyvu5uDRaSeTZSZH0ZZW2yLYQm9lknmjRZ0pdSrorzeT6aLiQQghBEKWd3gvL9_3BaELFzzwJCMOAKcOI552VOCFjlIupYoRRoKc79ztidaA3Q75sIQul1wYALDgM6jlTfuWH6V6lqfK6r6NGOQaWueMMV6wtVYZFZlnieiCGePKevuh3-jk8C1Wmw_98YeKdSHNbdRdTF4gR55rs0zV9OcvXcb_rm4HVVdkPXy_dEO7qATJHtr6pjNYQTdX-G02fYcPnMZ4YhU1E2xCVYujxOHLYzodZ0-veJyYkrMwjLFwBJmFaSW4UHuuokGz0b9uOfPvE5yxccuZI0Il_JATHQUijkByE6nF1F5BAo-CZMrVMhDK557wiQ7DiIRUUgK-8CkQoPuonKQJHCAsSKA9aaoQOFNcyIjJWJGYaO1y8NUhquTnMZoUChmj-VEc_d19jjZa_W5n1Gn37o7RZm6fArV1gspmj3Bq3Hymzqx1vwBBEKaK
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2014+7th+International+Symposium+on+Telecommunications+%28IST%29&rft.atitle=A+survey+of+pattern+matching+algorithm+in+intrusion+detection+system&rft.au=Gharaee%2C+Hossein&rft.au=Seifi%2C+Shokoufeh&rft.au=Monsefan%2C+Nima&rft.date=2014-09-01&rft.pub=IEEE&rft.spage=946&rft.epage=953&rft_id=info:doi/10.1109%2FISTEL.2014.7000839&rft.externalDocID=7000839