Security

Hash - Boyer-Moore - Horspool String Matching Algorithm for Intrusion Detection System

Download Now Free registration required

Executive Summary

String matching algorithms have become important in many applications. The Intrusion Detection System (IDS) is one of them. An IDS is created and becomes an important part of modern network structure to detect the malicious activities. The detection engine of IDS depends on string matching algorithms to perform the searching for these malicious activities, but this searching phase consumed around 70% of IDS processing time. Nowadays, as the networks increases rapidly, the searching time will increase due to a huge number of incoming packets together with the increasing of signatures rule policy.

  • Format: PDF
  • Size: 567.83 KB