A Comparative Study on Signature Based Ids Using Pattern Matching Algorithm
S. Mohanapriya1 , K. Prabha2
Section:Research Paper, Product Type: Journal Paper
Volume-6 ,
Issue-9 , Page no. 646-649, Sep-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i9.646649
Online published on Sep 30, 2018
Copyright © S. Mohanapriya, K. Prabha . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: S. Mohanapriya, K. Prabha, “A Comparative Study on Signature Based Ids Using Pattern Matching Algorithm,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.646-649, 2018.
MLA Style Citation: S. Mohanapriya, K. Prabha "A Comparative Study on Signature Based Ids Using Pattern Matching Algorithm." International Journal of Computer Sciences and Engineering 6.9 (2018): 646-649.
APA Style Citation: S. Mohanapriya, K. Prabha, (2018). A Comparative Study on Signature Based Ids Using Pattern Matching Algorithm. International Journal of Computer Sciences and Engineering, 6(9), 646-649.
BibTex Style Citation:
@article{Mohanapriya_2018,
author = {S. Mohanapriya, K. Prabha},
title = {A Comparative Study on Signature Based Ids Using Pattern Matching Algorithm},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {9 2018},
volume = {6},
Issue = {9},
month = {9},
year = {2018},
issn = {2347-2693},
pages = {646-649},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2922},
doi = {https://doi.org/10.26438/ijcse/v6i9.646649}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i9.646649}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2922
TI - A Comparative Study on Signature Based Ids Using Pattern Matching Algorithm
T2 - International Journal of Computer Sciences and Engineering
AU - S. Mohanapriya, K. Prabha
PY - 2018
DA - 2018/09/30
PB - IJCSE, Indore, INDIA
SP - 646-649
IS - 9
VL - 6
SN - 2347-2693
ER -
VIEWS | XML | |
403 | 220 downloads | 203 downloads |
Abstract
Innovation and imagination in string coordinating can play a massive part to get time effective execution in different areas of software engineering. String coordinating calculations are fundamental for arrange gadgets that channel parcels and streams in light of their payload. Applications like interruption discovery/aversion, web sifting, hostile to infection, and against spam all raise the interest for productive calculations managing string coordinating There is expanding sorts and quantities of malevolent assaults that endeavours to bargain the trustworthiness, privacy, accessibility, and other security parts of PCs and systems.
Key-Words / Index Term
Signature based ids, Pattern matching algorithm, String matching algorithm, finite state automation
References
[1] A Fast String Searching Algorithm, with R.S. Boyer. Communications of the Association for Computing Machinery, 20(10), 1977, pp. 762-772
[2] Akhtar Rasool Amrita Tiwari et al, String Matching Methodologies: A Comparative Analysis / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 3 (2) , 2012,3394 - 3397 Proceedings of the 6th Colloquium on
Automata, Languages and Programming, pages 118–132, London, UK, 1979 Springer.
[3] An Examination of Pattern Matching Algorithms for Intrusion Detection Systems submitted by James Kelly Dr. Frank Dehne (Director, School of Computer Science) Dr. Paul Van Oorschot (Thesis Supervisor) Carleton University, August 2006. Pages 21-39.
[4] https://brilliant.org/wiki/rabin-karp algorithm/#implementation-of-rabin- karp.
[5] https://www.geeksforgeeks.org/wildcard-pattern-matching/
[6] http://en.wikipedia.org/wiki/Boyer%E2%80%93Moore_string_search_algorithm.
[7] In 2007, Matyas Sustik and I thought of an apparently new variation that gives very good performance on small alphabets and has a small table. The algorithm is described in UTCS Tech Report TR-07-62, ``String Searching over Small Alphabets.``
[8] International Journal of Innovative Research in Computer Science and Engineering (IJIRCSE) www.ioirp.com ISSN: 2394-6364, Volume – 3, Issue – 1. March 2018 a survey on intrusion detection system using anamoly and signature based detectors submitted by Dr.K.Prabha, S.Mohanapriya, and K.Nirmaladevi.
[9] Network intrusion detection system using string matching algorithms submitted by Siddharth Saha and Telugu Praveen Kumar Department of Computer Science & Engineering National Institute of Technology Rourkela 2010. Pages 17-25
[10] Rolling Hash. Retrieved May 28, 2016, fromhttps://en.wikipedia.org/wiki/Rolling_hash.B. Commentz-Walter. A string matching algorithm fast on the average. Technical Report 79.09.007, IBM Heidelberg Scientific Center, 1979.
[11] S. Wu and U. Manber, A fast algorithm for multi-pattern searching, Technical Report TR-94-17, Department of Computer Science, University of Arizona, 1994.
[12] String searching algorithm from Wikipedia :https://en.wikipedia.org/wiki/Stringsearching_algorithm#Algorithms_using_a_finite_set_of_patterns
[13] YU Jianming, XUE Yibo, LI Jun, Memory Efficient String Matching Algorithm for
Network Intrusion Management System, Tsinghua Science and Technology.