Article
Version 1
Preserved in Portico This version is not peer-reviewed
A Multi-Fusion Pattern Matching Algorithm for Signature-Based Network Intrusion Detection System
Version 1
: Received: 23 August 2016 / Approved: 23 August 2016 / Online: 23 August 2016 (11:43:35 CEST)
How to cite: Naik S, M.; N, G. A Multi-Fusion Pattern Matching Algorithm for Signature-Based Network Intrusion Detection System. Preprints 2016, 2016080197. https://doi.org/10.20944/preprints201608.0197.v1 Naik S, M.; N, G. A Multi-Fusion Pattern Matching Algorithm for Signature-Based Network Intrusion Detection System. Preprints 2016, 2016080197. https://doi.org/10.20944/preprints201608.0197.v1
Abstract
Security has become a critical issue in today’s highly distributed and networked systems. Network intrusion detection systems (NIDSs), especially signature-based NIDSs, are being widely deployed in a distributed network environment with the purpose of defending against a variety of network attacks. Most of the commercially available NIDSs are software based and rely on pattern matching to extract the threat from network traffic. The increase in network speed and traffic may make existing algorithms to become a performance bottleneck. Therefore it is very necessary to develop faster and more efficient pattern matching algorithm in order to overcome the troubles on performance of NIDSs. Therefore, we propose a multi fusion pattern matching algorithm for Network Intrusion Detection Systems. The results obtained in percentages from the proposed fusion algorithm given better values in terms processing time in milliseconds than the existing algorithms when data English text are applied to evaluate the fusion performances.
Keywords
attack; network intrusion detection systems; pattern matching algorithms
Subject
Computer Science and Mathematics, Computer Science
Copyright: This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Comments (0)
We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.
Leave a public commentSend a private comment to the author(s)
* All users must log in before leaving a comment