Study on improvement of BM algorithm for intrusion detection

Author(s):  
Tao Liu ◽  
Jing Shi
2014 ◽  
Vol 556-562 ◽  
pp. 3010-3013
Author(s):  
Qing Qing Zhang ◽  
Qian Zhang ◽  
Yue Jiang Feng

This paper makes a summary of pattern matching algorithm in Intrusion Detection System: KMP algorithm, BM algorithm and BMH algorithm algorithm. The performances of various algorithms are analyzed, and then through the experiment data is verified. Last an improved algorithm based on the BM algorithm: BMD is proposed. BMD algorithm can reduce the space complexity and maintain the time complexity by reducing a pretreatment function and recording the number of times that a bad char found in the pattern.


2012 ◽  
Vol 532-533 ◽  
pp. 1414-1418 ◽  
Author(s):  
Feng Du

In this paper, a Faster algorithm: BMF is proposed, which sets improvements in the time complexity of the BM algorithm. The BMF algorithm defines a new pre-calculation function to increase in the skips of pattern significantly. Experiments indicate that the time complexity is reduced by 63% at most. Therefore, the improved algorithm could provide significant improvement in pattern matching performance when using in an IDS.


2013 ◽  
Vol 756-759 ◽  
pp. 3924-3928
Author(s):  
Lei Liu ◽  
Dai Ping Li

Due to the android platform is open source, more and more developers and manufacturers to use it. At the same time its security attracts more and more challenges, it is vulnerable to mobile phone virus attacks. In order to solve these problems, we should detect the files in the phone. Because the Boyer-Moore algorithms efficiency is higher than others, so we use it in android application intrusion detection. First we should set up a virus signature library, and store these signatures in the SQLite Database. Then scanning system of documents carries on the analysis and extraction corresponding feature codes, and use the BM algorithm to match them with virus signature, and we can find the viruses. What is new and original in this paper is that the efficiency of intrusion detection is higher.


2014 ◽  
Vol 599-601 ◽  
pp. 1025-1027
Author(s):  
Peng Hua Zhu ◽  
Xiao Fang Hou

Based on the traditional intrusion detection technology in BM pattern matching algorithm, solved the original algorithm in the detection of matching data string search inefficiency. Improved BM algorithm in combination with the advantages of traditional algorithm, overcomes the shortcoming of the traditional BM algorithm, reduces the mobile number in the pattern matching process in the pattern string, greatly improve the matching efficiency. Analysis and experiments show that, the efficiency of improved algorithm has been significantly improved.


2011 ◽  
Vol 148-149 ◽  
pp. 1145-1148
Author(s):  
Chao Yin

An improved BM-algorithm in intrusion detection system was presented which can increase displacements using the next character of the substring has been matched in the main string and pattern string. Experimental results obtained by capturing network packets with the number of matches, the number of pattern moves, the number of character comparisons as the main indicators. Experimental results show that the number of matches after and before improved is equal, and the number of pattern moves decreased by about13.3% after improved, and the number of character comparisons decreased by about 15.1% after improved. This indicates that the improved algorithm improved the efficiency of pattern matching.


2013 ◽  
Vol 380-384 ◽  
pp. 1576-1579
Author(s):  
Shi Song Xiao ◽  
Ao Lin Wang ◽  
Hui Feng

The pattern matching algorithm is the mainstream technology in the instruction detection system, and therefore as a pattern-matching methods core string matching algorithm directly affect an intrusion detection system performance and efficiency. So based on the discussions of the most fashionable pattern matching algorithms at present, an improved algorithm of AC-BM is presented. From the experiments in the Snort ,it is concluded that the improved algorithm of the performance and efficiency is higher than AC-BM algorithm.


Sign in / Sign up

Export Citation Format

Share Document