Improved deep packet inspection in data stream detection

Finite state automata are widely used in firewalls, data detection and content audit systems to match complex sets of regular expressions in network packets. However, with the continuous increase in the types of network contents and network traffics in recent years, the deep packet inspection systems based on finite state automata also require regular engines for less memory consumption and higher operating speed. This paper analyzes the feature and problem of finite state automata and improves non-deterministic finite automata by reducing the conversion edge to reduce the memory usage. The experiment results which are made by real-world dataset show that the memory usage is reduced more than half.

[1]  Jason R. C. Nurse,et al.  Baiting the hook: factors impacting susceptibility to phishing attacks , 2016, Human-centric Computing and Information Sciences.

[2]  KeeganNathan,et al.  A survey of cloud-based network intrusion detection analysis , 2016 .

[3]  John W. Lockwood,et al.  Deep packet inspection using parallel bloom filters , 2004, IEEE Micro.

[4]  Anne Brüggemann-Klein Regular Expressions into Finite Automata , 1993, Theor. Comput. Sci..

[5]  Jian Shen,et al.  $$\varvec{\textit{KDVEM}}$$KDVEM: a $$k$$k-degree anonymity with vertex and edge modification algorithm , 2015, Computing.

[6]  Junjun Jiang,et al.  Robust Feature Matching for Remote Sensing Image Registration via Locally Linear Transforming , 2015, IEEE Transactions on Geoscience and Remote Sensing.

[7]  Lu Feng,et al.  An improved Hoeffding-ID data-stream classification algorithm , 2015, The Journal of Supercomputing.

[8]  H. Jonathan Chao,et al.  Scalable Lookahead Regular Expression Detection System for Deep Packet Inspection , 2012, IEEE/ACM Transactions on Networking.

[9]  Bin Gu,et al.  A Robust Regularization Path Algorithm for $\nu $ -Support Vector Classification , 2017, IEEE Transactions on Neural Networks and Learning Systems.

[10]  Jin Wang,et al.  Improved clustering algorithm based on high-speed network data stream , 2018, Soft Comput..

[11]  Ajay Kumar,et al.  A Novel Algorithm for the Conversion of Parallel Regular Expressions to Non-deterministic Finite Automata , 2014 .

[12]  Dan Chia-Tien Lo,et al.  Space Optimization on Counters for FPGA-Based Perl Compatible Regular Expressions , 2009, TRETS.

[13]  Patrick Crowley,et al.  Extending finite automata to efficiently match Perl-compatible regular expressions , 2008, CoNEXT '08.

[14]  Jin Wang,et al.  Semi-supervised Learning with Generative Adversarial Networks on Digital Signal Mod-ulation Classification , 2018 .

[15]  Yun Lin,et al.  Semi-Supervised Learning with Generative Adversarial Networks on Digital Signal Modulation Classification , 2018 .

[16]  Bin Gu,et al.  Incremental Support Vector Learning for Ordinal Regression , 2015, IEEE Transactions on Neural Networks and Learning Systems.

[17]  Xingming Sun,et al.  Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement , 2016, IEEE Transactions on Parallel and Distributed Systems.

[18]  Vern Paxson,et al.  Bro: a system for detecting network intruders in real-time , 1998, Comput. Networks.

[19]  Bin Li,et al.  An enhanced fall detection system for elderly person monitoring using consumer home networks , 2014, IEEE Transactions on Consumer Electronics.

[20]  Dong Hyun Jeong,et al.  A survey of cloud-based network intrusion detection analysis , 2016, Human-centric Computing and Information Sciences.

[21]  Chunyong Yin,et al.  Parallel implementing improved k-means applied for image retrieval and anomaly detection , 2017, Multimedia Tools and Applications.

[22]  Jin Wang,et al.  Location Privacy Protection Based on Differential Privacy Strategy for Big Data in Industrial Internet of Things , 2018, IEEE Transactions on Industrial Informatics.

[23]  Sylvia Ratnasamy,et al.  BlindBox: Deep Packet Inspection over Encrypted Traffic , 2015, SIGCOMM.

[24]  Lucas Vespa,et al.  Deterministic finite automata characterization and optimization for scalable pattern matching , 2011, TACO.

[25]  R. Sherratt,et al.  Adversarial learning for distant supervised relation extraction , 2018 .

[26]  T. V. Lakshman,et al.  Fast and memory-efficient regular expression matching for deep packet inspection , 2006, 2006 Symposium on Architecture For Networking And Communications Systems.

[27]  V. Krishna Reddy,et al.  NDynamic Framework for Secure VM Migration over Cloud Computing , 2017, J. Inf. Process. Syst..

[28]  Patrick Crowley,et al.  A hybrid finite automaton for practical deep packet inspection , 2007, CoNEXT '07.

[29]  Tinghuai Ma,et al.  KDVEM : a k-degree anonymity with vertex and edge modification algorithm , 2015, Computing.

[30]  Xingming Sun,et al.  Structural Minimax Probability Machine , 2017, IEEE Transactions on Neural Networks and Learning Systems.

[31]  Mohammed Farik,et al.  Intrusion Detection & Prevention Systems - Sourcefire Snort , 2016 .