Preprint Article Version 1 Preserved in Portico This version is not peer-reviewed

A Multi-Fusion Pattern Matching Algorithm for Signature-Based Network Intrusion Detection System

Version 1 : Received: 23 August 2016 / Approved: 23 August 2016 / Online: 23 August 2016 (11:43:35 CEST)

How to cite: Naik S, M.; N, G. A Multi-Fusion Pattern Matching Algorithm for Signature-Based Network Intrusion Detection System. Preprints 2016, 2016080197. https://doi.org/10.20944/preprints201608.0197.v1 Naik S, M.; N, G. A Multi-Fusion Pattern Matching Algorithm for Signature-Based Network Intrusion Detection System. Preprints 2016, 2016080197. https://doi.org/10.20944/preprints201608.0197.v1

Abstract

Security has become a critical issue in today’s highly distributed and networked systems. Network intrusion detection systems (NIDSs), especially signature-based NIDSs, are being widely deployed in a distributed network environment with the purpose of defending against a variety of network attacks. Most of the commercially available NIDSs are software based and rely on pattern matching to extract the threat from network traffic. The increase in network speed and traffic may make existing algorithms to become a performance bottleneck. Therefore it is very necessary to develop faster and more efficient pattern matching algorithm in order to overcome the troubles on performance of NIDSs. Therefore, we propose a multi fusion pattern matching algorithm for Network Intrusion Detection Systems. The results obtained in percentages from the proposed fusion algorithm given better values in terms processing time in milliseconds than the existing algorithms when data English text are applied to evaluate the fusion performances.

Keywords

attack; network intrusion detection systems; pattern matching algorithms

Subject

Computer Science and Mathematics, Computer Science

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 0
Metrics 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.