• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Liu Yanbing, Liu Ping, Tan Jianlong, Guo Li. A Multiple String Matching Algorithm Based on Memory Optimization[J]. Journal of Computer Research and Development, 2009, 46(10): 1768-1776.
Citation: Liu Yanbing, Liu Ping, Tan Jianlong, Guo Li. A Multiple String Matching Algorithm Based on Memory Optimization[J]. Journal of Computer Research and Development, 2009, 46(10): 1768-1776.

A Multiple String Matching Algorithm Based on Memory Optimization

More Information
  • Published Date: October 14, 2009
  • Multiple string matching algorithms play a fundamental role in many network security systems, such as intrusion detection and prevention systems, anti-virus systems, anti-spam systems, firewall, etc. It has been observed that the memory space usage and cache locality of automata are critical factors affecting multiple string matching algorithms searching speed. As the pattern set size grows larger and larger, classical multiple string matching algorithms suffer from great performance degradation because of the massive storage usage of string matching automata. The authors propose optimization strategies for the classical string matching algorithm SBOM to reduce its automata size and improve its cache locality, which results in a great promotion in searching speed. More specifically, the Factor Oracle of SBOM algorithm is first replaced with a suffix tree structure, and then the rarely accessed automata nodes are removed through the pruning method to reduce suffix tree to nearly linear space complexity, and finally the pruned suffix tree is represented with double-array trie structure to compress its memory space. Compared with SBOM, this algorithm can greatly reduce memory usage and improve searching speed. Experiments on random data sets show that the proposed algorithm uses memory less than 5% of SBOM and achieves 100% performance improvement over SBOM algorithm. The proposed algorithm is especially suitable for high-speed online pattern matching.
  • Related Articles

    [1]Gao Guangyong, Ji Chi, Xia Zhihua. Reversible Data Hiding in Color Encrypted Images Based on Color Channels Correlation and Entropy Coding[J]. Journal of Computer Research and Development. DOI: 10.7544/issn1000-1239.202330880
    [2]Guan Xiaoqiang, Wang Wenjian, Pang Jifang, Meng Yinfeng. Space Transformation Based Random Forest Algorithm[J]. Journal of Computer Research and Development, 2021, 58(11): 2485-2499. DOI: 10.7544/issn1000-1239.2021.20200523
    [3]Tian Ye, Xiang Shijun. LBP and Multilayer DCT Based Anti-Spoofing Countermeasure in Face Liveness Detection[J]. Journal of Computer Research and Development, 2018, 55(3): 643-650. DOI: 10.7544/issn1000-1239.2018.20160417
    [4]Liu Shenglan, Feng Lin, Jin Bo, Wu Zhenyu. A New Local Space Alignment Algorithm[J]. Journal of Computer Research and Development, 2013, 50(7): 1426-1434.
    [5]Xiong Gangqiang, Yu Jiande, Xiong Changzhen, Qi Dongxu. Reversible Factorization of U Orthogonal Transform and Image Lossless Coding[J]. Journal of Computer Research and Development, 2012, 49(4): 856-863.
    [6]Zhang Hongyi, Zhang Junying, Zhao Feng. Extraction of Discriminant Features Based on Optimal Transformation and Cluster Centers of Kernel Space[J]. Journal of Computer Research and Development, 2008, 45(12): 2138-2144.
    [7]Chen Yunjie, Zhang Jianwei, Wei Zhihui, Heng Pheng Ann, Xia Deshen. Automatic Chinese Visual Human Image Segmentation in HSV Space[J]. Journal of Computer Research and Development, 2007, 44(12): 2036-2043.
    [8]Wang Huanbao, Zhang Yousheng, and Li Yuan. A Diagram of Strand Spaces for Security Protocols[J]. Journal of Computer Research and Development, 2006, 43(12): 2062-2068.
    [9]Liu Bing, Yan Heping, Duan Jiangjiao, Wang Wei, and Shi Baile. A Bottom-Up Distance-Based Index Tree for Metric Space[J]. Journal of Computer Research and Development, 2006, 43(9): 1651-1657.
    [10]Zhan Yongzhao, Wang Jinfeng, and Mao Qirong. Nested Knowledge Space Model and Awareness Processing in a Collaborative Learning Environment[J]. Journal of Computer Research and Development, 2005, 42(7): 1159-1165.

Catalog

    Article views (809) PDF downloads (776) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return