高级检索
    张 宇, 刘 萍, 刘燕兵, 谭建龙, 郭 莉. 对模式串匹配算法WuManber的复杂度攻击[J]. 计算机研究与发展, 2011, 48(8): 1381-1389.
    引用本文: 张 宇, 刘 萍, 刘燕兵, 谭建龙, 郭 莉. 对模式串匹配算法WuManber的复杂度攻击[J]. 计算机研究与发展, 2011, 48(8): 1381-1389.
    Zhang Yu, Liu Ping, Liu Yanbing, Tan Jianlong, Guo Li. Algorithmic Complexity Attacks Against WuManber[J]. Journal of Computer Research and Development, 2011, 48(8): 1381-1389.
    Citation: Zhang Yu, Liu Ping, Liu Yanbing, Tan Jianlong, Guo Li. Algorithmic Complexity Attacks Against WuManber[J]. Journal of Computer Research and Development, 2011, 48(8): 1381-1389.

    对模式串匹配算法WuManber的复杂度攻击

    Algorithmic Complexity Attacks Against WuManber

    • 摘要: 模式匹配问题是计算机科学的基础问题之一,是网络信息安全、信息检索与过滤、计算生物学等众多领域的核心问题.模式匹配技术在网络信息安全领域的广泛应用,导致了许多安全问题.WuManber算法是一种经典的多模式匹配算法,通过对WuManber算法实现原理的分析,给出了一种对WuManber算法进行复杂度攻击的方法,并对攻击数据的构造问题给出了问题描述和最优求解.实验表明,WuManber算法检测攻击数据的速度明显慢于检测随机数据和网络真实数据的速度,并发现只需已知少量的模式串,就可以构造有效的攻击数据.根据攻击数据的构造方法,在给出攻击方法的同时,也给出了防守方面的建议,可以有效地提高使用WuManber算法系统的安全性.

       

      Abstract: Pattern matching is one of the fundamental problems in computer science. It is the key problem of many important scopes such as network information security, information retrieval and filtration, computational biology, etc. A great number of security problems have arisen with the wide application of pattern matching, especially in network information security systems, such as intrusion detection and prevention systems, anti-virus systems, anti-spam systems, firewall, etc. A method of algorithmic complexity attacks against WuManber which is a classical multi-patterrn algorithm, and the optimal solution of creating the attacking data are presented in this article. Compared with random data and the data from network, the attacking data can greatly reduce the searching speed of WuManber. Experiments on random data sets show that the larger character set, the better attacking performance. And experiments on the data from the network show that the attacking data can reduce WuManber searching speed by more than 50%. It is found that if a small part of the pattern set is known, the attack data can be created. Defensively speaking, it is important that the pattern set must be kept secret. This article also provides some strategies of improving the security of network information security systems. The attacking data can also be used in checking the system security.

       

    /

    返回文章
    返回