Performance Study of the Running Times of well known Pattern Matching Algorithms for Signature-based Intrusion Detection Systems

Download Now
Provided by: Auricle Technologies
Topic: Security
Format: PDF
Intrusion Detection System (IDS) is the basic component of any network defense scheme. Signature based intrusion detection techniques are widely used in networks for fast response to detect threats. One of the main challenges faced by signature-based IDS is that every signature requires an entry in the database and so a complete database might contain hundreds or even thousands of entries. Each packet is to be compared with all the entries in the database. This can be highly resource consuming and doing so will slow down the throughput and making the IDS vulnerable.
Download Now

Find By Topic