Abstract

Nowadays the Internet is very massive and the need for a system to protect the networks from being attacked becomes very important. One of the main goals of studying pattern matching techniques is their significant role in real-world applications, such as the intrusion detection systems branch. The purpose of the network attack detection systems NIDS is to protect the infocommunication network from unauthorized access. This article provides an analysis of the exact match and fuzzy matching methods, and discusses a new implementation of the classic Aho-Corasick pattern matching algorithm at the hardware level. The proposed approach to the implementation of the Aho-Corasick algorithm can make it possible to ensure the efficient use of resources, such as memory and energy.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call