SlideShare a Scribd company logo
GLOBALSOFT TECHNOLOGIES 
IEEE PROJECTS & SOFTWARE DEVELOPMENTS 
IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE 
BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS 
CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 
Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com 
CompactDFA: Scalable Pattern Matching Using 
Longest Prefix Match Solutions 
Abstract— 
A central component in all contemporary intrusiondetection systems (IDSs) is their pattern 
matching algorithms,which are often based on constructing and traversing a 
deterministicfinite automaton (DFA) that represents the patterns. Whilethis approach 
ensures deterministic time guarantees, modernIDSs need to deal with hundreds of patterns, 
thus requiring tostore very large DFAs, which usually do not fit in fast memory.This results 
in a major bottleneck on the throughput of the IDS,as well as its power consumption and 
cost. We propose a novelmethod to compress DFAs by observing that the name used 
bycommon DFA encoding is meaningless. While regular DFAs storeseparately each 
transition between two states, we use this degreeof freedom and encode states in such a way 
that all transitions to aspecific state are represented by asingle prefixthatdefines a set 
ofcurrent states. Our technique applies to a large class of automata,which can be 
categorized by simple properties. Then, the problemof pattern matching is reduced to the 
well-studied problem ofLongest PrefixMatch(LPM), which can be solved either in 
ternarycontent-addressable memory (TCAM), in commercially availableIP-lookup chips, 
or in software. Specifically, we show that with aTCAM our scheme can reach a throughput 
of 10 Gb/s with lowpower consumption. 
CONCLUSION 
This paper shows a reduction of the pattern matching problemto the IP-lookup problem. 
Our scheme, CompactDFA, gets asan input a DFA and produces compressed rule sets; 
each compressedrule defines the set of states that the rule applies to usingacommonprefix.
A state may match more than one rule, andin this case the rulewith the longest prefix 
determines the action—exactlyas inthe IP forwarding case.With this reduction, we have 
new arsenals of IP-lookup solutions,eitherin hardware or in software that can boost up 
theperformance of p 
attern matching, a major task in contemporarysecurity tools. In this paper, we focus on the 
usage of TCAMfor pattern matching, a hardware device that is commonly usedfor IP-lookupand 
packet classification and is deployed in manycore routers. We show that with 
moderate size of TCAM spacewe can achieve fast pattern matching of 2 Gb/s with low 
powerconsumption. Due to its small memory and power requirements,it is feasible to 
implement our architecture with several TCAMsworkingin parallel, such that each TCAM 
performs patternmatching on a different session, achieving a total throughput of10 
Gb/sand beyond. 
SYSTEM CONFIGURATION:- 
HARDWARE CONFIGURATION:- 
 Processor - Pentium –IV 
 Speed - 1.1 Ghz 
 RAM - 256 MB(min) 
 Hard Disk - 20 GB 
 Key Board - Standard Windows Keyboard 
 Mouse - Two or Three Button Mouse 
 Monitor - SVGA 
SOFTWARE CONFIGURATION:- 
 Operating System : Windows XP 
 Programming Language : JAVA 
 Java Version : JDK 1.6 & above.
IEEE 2014 JAVA NETWORKING PROJECTS Compact dfa scalable pattern matching usinglongest prefix match solutions

More Related Content

PDF
Modelling Adaptation Policies As Domain-Specific Constraints
DOCX
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Fault tolerant network interfaces fo...
PPT
Adaptive Computing Seminar - Suyog Potdar
PDF
AI On the Edge: Model Compression
PDF
"Machine Learning- based Image Compression: Ready for Prime Time?," a Present...
DOCX
Fpga implementation of truncated multiplier for array multiplication
PDF
NoSQL and Cloud Services - Philip Balinow, Comfo
PDF
Error Permissive Computing
Modelling Adaptation Policies As Domain-Specific Constraints
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Fault tolerant network interfaces fo...
Adaptive Computing Seminar - Suyog Potdar
AI On the Edge: Model Compression
"Machine Learning- based Image Compression: Ready for Prime Time?," a Present...
Fpga implementation of truncated multiplier for array multiplication
NoSQL and Cloud Services - Philip Balinow, Comfo
Error Permissive Computing

Viewers also liked (7)

DOCX
IEEE 2014 JAVA NETWORKING PROJECTS A geometric deployment and routing scheme ...
DOCX
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Top k-query-result-completeness-veri...
DOCX
IEEE 2014 JAVA NETWORKING PROJECTS Boundary cutting for packet classification
DOCX
IEEE 2014 JAVA NETWORKING PROJECTS Hop by-hop routing in wireless mesh networ...
DOCX
IEEE 2014 JAVA NETWORKING PROJECTS Receiver based flow control for networks i...
DOCX
IEEE 2014 JAVA NETWORKING PROJECTS Mobile data offloading how much can wi fi ...
DOCX
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Tradeoff between reliability and sec...
IEEE 2014 JAVA NETWORKING PROJECTS A geometric deployment and routing scheme ...
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Top k-query-result-completeness-veri...
IEEE 2014 JAVA NETWORKING PROJECTS Boundary cutting for packet classification
IEEE 2014 JAVA NETWORKING PROJECTS Hop by-hop routing in wireless mesh networ...
IEEE 2014 JAVA NETWORKING PROJECTS Receiver based flow control for networks i...
IEEE 2014 JAVA NETWORKING PROJECTS Mobile data offloading how much can wi fi ...
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Tradeoff between reliability and sec...
Ad

Similar to IEEE 2014 JAVA NETWORKING PROJECTS Compact dfa scalable pattern matching usinglongest prefix match solutions (20)

DOCX
Compact dfa scalable pattern matching using longest prefix match solutions
DOCX
Compact dfa scalable pattern matching using longest prefix match solutions
DOCX
IEEE 2014 NS2 NETWORKING PROJECTS Fast regular expression matching using sma...
PDF
Iaetsd implementation of aho corasick algorithm
PDF
E031022026
PDF
O0262090097
PDF
O0262090097
PDF
A flexible wildcard pattern matching accelerator via simultaneous discrete fi...
PDF
A Survey on DPI Techniques for Regular Expression Detection in Network Intrus...
PDF
Deep Packet Inspection with Regular Expression Matching
PDF
International Journal of Engineering and Science Invention (IJESI)
PPT
Hardware Approaches for Fast Lookup & Classification
PPTX
A FPGA-Based Deep Packet Inspection Engine for Network Intrusion Detection Sy...
PDF
Ip addressing3
PDF
Overlay automata and algorithms for fast and scalable regular expression matc...
PDF
IJETAE_1013_119
PPTX
MTech_Network_Topics_. Presentation.pptx
PDF
A parallel string matching engine for use in high speed network intrusion det...
PDF
RCIM 2008 - Modello Generale
PDF
IJCTT-V4I9P137
Compact dfa scalable pattern matching using longest prefix match solutions
Compact dfa scalable pattern matching using longest prefix match solutions
IEEE 2014 NS2 NETWORKING PROJECTS Fast regular expression matching using sma...
Iaetsd implementation of aho corasick algorithm
E031022026
O0262090097
O0262090097
A flexible wildcard pattern matching accelerator via simultaneous discrete fi...
A Survey on DPI Techniques for Regular Expression Detection in Network Intrus...
Deep Packet Inspection with Regular Expression Matching
International Journal of Engineering and Science Invention (IJESI)
Hardware Approaches for Fast Lookup & Classification
A FPGA-Based Deep Packet Inspection Engine for Network Intrusion Detection Sy...
Ip addressing3
Overlay automata and algorithms for fast and scalable regular expression matc...
IJETAE_1013_119
MTech_Network_Topics_. Presentation.pptx
A parallel string matching engine for use in high speed network intrusion det...
RCIM 2008 - Modello Generale
IJCTT-V4I9P137
Ad

More from IEEEGLOBALSOFTSTUDENTPROJECTS (20)

DOCX
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS Peer assisted vo d systems an ef...
DOCX
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS On false-data-injection-attacks-...
DOCX
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS On social delay tolerant network...
DOCX
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS Cross layer approach for minimiz...
DOCX
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS Constructing load balanced data ...
DOCX
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS An ontology based hybrid approac...
DOCX
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS A security and privacy aware loc...
DOCX
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Transformation based monetary cost op...
DOCX
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Scalable distributed service integrit...
DOCX
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Scalable analytics for iaa s cloud av...
DOCX
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Performance and cost evaluation of an...
DOC
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Oruta privacy preserving public audit...
DOCX
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Optimal power allocation and load dis...
DOCX
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Dynamic heterogeneity aware resource ...
DOCX
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Dynamic cloud pricing for revenue max...
DOCX
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Distributed, concurrent, and independ...
DOCX
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Cloud based mobile multimedia recomme...
DOCX
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Cloud assisted mobile-access of healt...
DOCX
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Automatic scaling of internet applica...
DOCX
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Adaptive algorithm for minimizing clo...
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS Peer assisted vo d systems an ef...
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS On false-data-injection-attacks-...
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS On social delay tolerant network...
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS Cross layer approach for minimiz...
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS Constructing load balanced data ...
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS An ontology based hybrid approac...
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS A security and privacy aware loc...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Transformation based monetary cost op...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Scalable distributed service integrit...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Scalable analytics for iaa s cloud av...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Performance and cost evaluation of an...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Oruta privacy preserving public audit...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Optimal power allocation and load dis...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Dynamic heterogeneity aware resource ...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Dynamic cloud pricing for revenue max...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Distributed, concurrent, and independ...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Cloud based mobile multimedia recomme...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Cloud assisted mobile-access of healt...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Automatic scaling of internet applica...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Adaptive algorithm for minimizing clo...

Recently uploaded (20)

PDF
EXPLORING LEARNING ENGAGEMENT FACTORS INFLUENCING BEHAVIORAL, COGNITIVE, AND ...
PDF
Categorization of Factors Affecting Classification Algorithms Selection
PDF
Human-AI Collaboration: Balancing Agentic AI and Autonomy in Hybrid Systems
PPTX
Information Storage and Retrieval Techniques Unit III
PDF
null (2) bgfbg bfgb bfgb fbfg bfbgf b.pdf
PPTX
Artificial Intelligence
PDF
COURSE DESCRIPTOR OF SURVEYING R24 SYLLABUS
PDF
BIO-INSPIRED HORMONAL MODULATION AND ADAPTIVE ORCHESTRATION IN S-AI-GPT
PPT
INTRODUCTION -Data Warehousing and Mining-M.Tech- VTU.ppt
PDF
III.4.1.2_The_Space_Environment.p pdffdf
PDF
Exploratory_Data_Analysis_Fundamentals.pdf
PDF
Level 2 – IBM Data and AI Fundamentals (1)_v1.1.PDF
PDF
BIO-INSPIRED ARCHITECTURE FOR PARSIMONIOUS CONVERSATIONAL INTELLIGENCE : THE ...
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PPTX
introduction to high performance computing
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PPTX
6ME3A-Unit-II-Sensors and Actuators_Handouts.pptx
PDF
A SYSTEMATIC REVIEW OF APPLICATIONS IN FRAUD DETECTION
PDF
UNIT no 1 INTRODUCTION TO DBMS NOTES.pdf
PPTX
Fundamentals of safety and accident prevention -final (1).pptx
EXPLORING LEARNING ENGAGEMENT FACTORS INFLUENCING BEHAVIORAL, COGNITIVE, AND ...
Categorization of Factors Affecting Classification Algorithms Selection
Human-AI Collaboration: Balancing Agentic AI and Autonomy in Hybrid Systems
Information Storage and Retrieval Techniques Unit III
null (2) bgfbg bfgb bfgb fbfg bfbgf b.pdf
Artificial Intelligence
COURSE DESCRIPTOR OF SURVEYING R24 SYLLABUS
BIO-INSPIRED HORMONAL MODULATION AND ADAPTIVE ORCHESTRATION IN S-AI-GPT
INTRODUCTION -Data Warehousing and Mining-M.Tech- VTU.ppt
III.4.1.2_The_Space_Environment.p pdffdf
Exploratory_Data_Analysis_Fundamentals.pdf
Level 2 – IBM Data and AI Fundamentals (1)_v1.1.PDF
BIO-INSPIRED ARCHITECTURE FOR PARSIMONIOUS CONVERSATIONAL INTELLIGENCE : THE ...
R24 SURVEYING LAB MANUAL for civil enggi
introduction to high performance computing
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
6ME3A-Unit-II-Sensors and Actuators_Handouts.pptx
A SYSTEMATIC REVIEW OF APPLICATIONS IN FRAUD DETECTION
UNIT no 1 INTRODUCTION TO DBMS NOTES.pdf
Fundamentals of safety and accident prevention -final (1).pptx

IEEE 2014 JAVA NETWORKING PROJECTS Compact dfa scalable pattern matching usinglongest prefix match solutions

  • 1. GLOBALSOFT TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com CompactDFA: Scalable Pattern Matching Using Longest Prefix Match Solutions Abstract— A central component in all contemporary intrusiondetection systems (IDSs) is their pattern matching algorithms,which are often based on constructing and traversing a deterministicfinite automaton (DFA) that represents the patterns. Whilethis approach ensures deterministic time guarantees, modernIDSs need to deal with hundreds of patterns, thus requiring tostore very large DFAs, which usually do not fit in fast memory.This results in a major bottleneck on the throughput of the IDS,as well as its power consumption and cost. We propose a novelmethod to compress DFAs by observing that the name used bycommon DFA encoding is meaningless. While regular DFAs storeseparately each transition between two states, we use this degreeof freedom and encode states in such a way that all transitions to aspecific state are represented by asingle prefixthatdefines a set ofcurrent states. Our technique applies to a large class of automata,which can be categorized by simple properties. Then, the problemof pattern matching is reduced to the well-studied problem ofLongest PrefixMatch(LPM), which can be solved either in ternarycontent-addressable memory (TCAM), in commercially availableIP-lookup chips, or in software. Specifically, we show that with aTCAM our scheme can reach a throughput of 10 Gb/s with lowpower consumption. CONCLUSION This paper shows a reduction of the pattern matching problemto the IP-lookup problem. Our scheme, CompactDFA, gets asan input a DFA and produces compressed rule sets; each compressedrule defines the set of states that the rule applies to usingacommonprefix.
  • 2. A state may match more than one rule, andin this case the rulewith the longest prefix determines the action—exactlyas inthe IP forwarding case.With this reduction, we have new arsenals of IP-lookup solutions,eitherin hardware or in software that can boost up theperformance of p attern matching, a major task in contemporarysecurity tools. In this paper, we focus on the usage of TCAMfor pattern matching, a hardware device that is commonly usedfor IP-lookupand packet classification and is deployed in manycore routers. We show that with moderate size of TCAM spacewe can achieve fast pattern matching of 2 Gb/s with low powerconsumption. Due to its small memory and power requirements,it is feasible to implement our architecture with several TCAMsworkingin parallel, such that each TCAM performs patternmatching on a different session, achieving a total throughput of10 Gb/sand beyond. SYSTEM CONFIGURATION:- HARDWARE CONFIGURATION:-  Processor - Pentium –IV  Speed - 1.1 Ghz  RAM - 256 MB(min)  Hard Disk - 20 GB  Key Board - Standard Windows Keyboard  Mouse - Two or Three Button Mouse  Monitor - SVGA SOFTWARE CONFIGURATION:-  Operating System : Windows XP  Programming Language : JAVA  Java Version : JDK 1.6 & above.