Tripp, Gerald (2007) Regular expression matching with input compression: a hardware design for use within network intrusion detection systems. Journal in Computer Virology, 3 (2). pp. 125-134. ISSN 1772-9890.
|The full text of this publication is not available from this repository. (Contact us about this Publication)|
This paper describes an optimised finite state automata based hardware design for implementing high speed regular expression matching. Automata based implementations of regular expression matching can become quite complex and if table driven can use large amounts of memory this can be a problem for hardware based implementations, as the amount of memory available within standard Field Programmable Gate Array (FPGA) components can be quite small as compared with the amount of resources we expect to find within a software environment. This work uses an existing packed array style of table based automata implementation, but then adds a form of input compression to group together characters that are treated identically by the automata. A hardware design for such a system has been created for use within a Xilinx Field Programmable Gate Array and tested by simulation. The design operates at a fixed scan rate of 2.0 Gbps independent of the regular expression used or the input data being scanned. The regular expression rules are first compiled by software and then loaded into the design at run time and may be updated dynamically without modification to the design.
|Additional information:||- available online from: http://dx.doi.org/10.1007/s11416-007-0047-z|
|Subjects:||Q Science > QA Mathematics (inc Computing science) > QA 76 Software, computer programming,|
|Divisions:||Faculties > Science Technology and Medical Studies > School of Computing > Systems Architecture Group|
|Depositing User:||Mark Wheadon|
|Date Deposited:||24 Nov 2008 18:05|
|Last Modified:||25 Jun 2009 17:42|
|Resource URI:||http://kar.kent.ac.uk/id/eprint/14582 (The current URI for this page, for reference purposes)|
- Depositors only (login required):