• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Liu Yanbing, Liu Ping, Tan Jianlong, Guo Li. A Multiple String Matching Algorithm Based on Memory Optimization[J]. Journal of Computer Research and Development, 2009, 46(10): 1768-1776.
Citation: Liu Yanbing, Liu Ping, Tan Jianlong, Guo Li. A Multiple String Matching Algorithm Based on Memory Optimization[J]. Journal of Computer Research and Development, 2009, 46(10): 1768-1776.

A Multiple String Matching Algorithm Based on Memory Optimization

More Information
  • Published Date: October 14, 2009
  • Multiple string matching algorithms play a fundamental role in many network security systems, such as intrusion detection and prevention systems, anti-virus systems, anti-spam systems, firewall, etc. It has been observed that the memory space usage and cache locality of automata are critical factors affecting multiple string matching algorithms searching speed. As the pattern set size grows larger and larger, classical multiple string matching algorithms suffer from great performance degradation because of the massive storage usage of string matching automata. The authors propose optimization strategies for the classical string matching algorithm SBOM to reduce its automata size and improve its cache locality, which results in a great promotion in searching speed. More specifically, the Factor Oracle of SBOM algorithm is first replaced with a suffix tree structure, and then the rarely accessed automata nodes are removed through the pruning method to reduce suffix tree to nearly linear space complexity, and finally the pruned suffix tree is represented with double-array trie structure to compress its memory space. Compared with SBOM, this algorithm can greatly reduce memory usage and improve searching speed. Experiments on random data sets show that the proposed algorithm uses memory less than 5% of SBOM and achieves 100% performance improvement over SBOM algorithm. The proposed algorithm is especially suitable for high-speed online pattern matching.
  • Related Articles

    [1]Hu Yujing, Gao Yang, An Bo. Online Counterfactual Regret Minimization in Repeated Imperfect Information Extensive Games[J]. Journal of Computer Research and Development, 2014, 51(10): 2160-2170. DOI: 10.7544/issn1000-1239.2014.20130823
    [2]Tian Youliang, Peng Chenggen, Ma Jianfeng, Jiang Qi, Zhu Jianming. Game-Theoretic Mechanism for Cryptographic Protocol[J]. Journal of Computer Research and Development, 2014, 51(2): 344-352.
    [3]Zhu Guiming, Jin Shiyao, Guo Deke, Wei Hailiang. SOSC:A Self-Organizing Semantic Cluster Based P2P Query Routing Algorithm[J]. Journal of Computer Research and Development, 2011, 48(5): 736-745.
    [4]Cheng Bailiang, Zeng Guosun, Jie Anquan. Study of Multi-Agent Trust Coalition Based on Self-Organization Evolution[J]. Journal of Computer Research and Development, 2010, 47(8): 1382-1391.
    [5]Shi Chunqi, Shi Zhiping, Liu Xi, Shi Zhongzhi. Image Segmentation Based on Self-Organizing Dynamic Neural Network[J]. Journal of Computer Research and Development, 2009, 46(1): 23-30.
    [6]Luo Junhai and Fan Mingyu. Research on Trust Model Based on Game Theory in Mobile Ad-Hoc Networks[J]. Journal of Computer Research and Development, 2008, 45(10): 1704-1710.
    [7]Wang Wei and Zeng Guosun. Self-Organization Resource Topology Revolution Based on Trust Mechanism[J]. Journal of Computer Research and Development, 2007, 44(11): 1849-1856.
    [8]Huang Guanyao, Hong Peilin, and Li Jinsheng. P2P-VCG: A Game Theory Proposal for Bandwidth Allocation[J]. Journal of Computer Research and Development, 2007, 44(1): 78-84.
    [9]Tang Jiuyang, Zhang Weiming, Xiao Weidong, and Tang Daquan. Self-Organizing Peer-to-Peer Network Based on Community Mimicking Social Society[J]. Journal of Computer Research and Development, 2006, 43(8): 1383-1390.
    [10]Hou Yuexian, Ding Zheng, and He Pilian. Self-Organizing Isometric Embedding[J]. Journal of Computer Research and Development, 2005, 42(2): 188-195.

Catalog

    Article views (809) PDF downloads (776) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return