• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Chen Shuhui, Su Jinshu, Fan Huiping, and Hou Jie. An FSM State Table Compressing Method Based on Deep Packet Inspection[J]. Journal of Computer Research and Development, 2008, 45(8): 1299-1306.
Citation: Chen Shuhui, Su Jinshu, Fan Huiping, and Hou Jie. An FSM State Table Compressing Method Based on Deep Packet Inspection[J]. Journal of Computer Research and Development, 2008, 45(8): 1299-1306.

An FSM State Table Compressing Method Based on Deep Packet Inspection

More Information
  • Published Date: August 14, 2008
  • Recent advances in network packet processing focus on payload inspection for applications that include content-based billing, layer-7 switching and Internet security. Most of the applications in this family compile the fingerprints to finite state machine (FSM), and then process packets based on state transition table. There are two kinds of FSM: deterministic finite automaton (DFA) and nondeterministic finite automaton (NFA). DFA is fast but needs more memory, while NFA needs little memory but is slow. There is little time for every packet to be processed in payload inspection, so DFA is always preferred. To solve the state transition table explosion problem of regular expression pattern matching using DFA, a set intersected precode (SI-precode) method is introduced. SI-precode codes all input symbols before the conversion from regular expressions to DFA, and the space of FSM state transition table is then reduced by compressing the input symbols. Experiments based on L7-filter are employed to show that the memory space would save 87% to 97% for single pattern FSM, and 59% for multiple-pattern FSM with 50 patterns. SI-precode doee not affect the performance in the case of the architecture combining software and hardware. For pure software implementation, the performance decreases 2% to 4%.
  • Related Articles

    [1]Li Tao, Liu Yali. A Double PUF-Based RFID Authentication Protocol[J]. Journal of Computer Research and Development, 2021, 58(8): 1801-1810. DOI: 10.7544/issn1000-1239.2021.20200477
    [2]Wei Xiaochao, Xu Lin, Zheng Zhihua, Wang Hao. Efficient and Secure Cloud-Assisted Pattern Matching Protocol for Intelligent Environment[J]. Journal of Computer Research and Development, 2019, 56(11): 2365-2374. DOI: 10.7544/issn1000-1239.2019.20190365
    [3]Wei Xiaochao, Zheng Zhihua, Wang Hao. An Efficient and Secure Three-Party Wildcard Pattern Matching Protocol[J]. Journal of Computer Research and Development, 2018, 55(10): 2125-2133. DOI: 10.7544/issn1000-1239.2018.20180418
    [4]Yuan Bianqing, Liu Jiqiang. A Universally Composable Secure Group Ownership Transfer Protocol for RFID Tags[J]. Journal of Computer Research and Development, 2015, 52(10): 2323-2331. DOI: 10.7544/issn1000-1239.2015.20150555
    [5]Ding Linxuan, Huang Kun, Zhang Dafang. Multi-Stride Regular Expression Matching Using Parallel Character Index[J]. Journal of Computer Research and Development, 2015, 52(3): 681-690. DOI: 10.7544/issn1000-1239.2015.20131255
    [6]Chen Puqiang, Guo Lijun, Zhang Rong, Zhao Jieyu. Patch Matching with Global Spatial Constraints for Person Re-Identification[J]. Journal of Computer Research and Development, 2015, 52(3): 596-605. DOI: 10.7544/issn1000-1239.2015.20131481
    [7]Liu Xingkui, Shao Zongyou, Liu Xinchun, Sun Ninghui. Fine-Grained Parallel Regular Expression Matching for Deep Packet Inspection[J]. Journal of Computer Research and Development, 2014, 51(5): 1061-1070.
    [8]Zhang Xuejun, Cai Wenqi, Sun Zhixin, Wang Suoping. An Improved Minimalist Mutual-Authentication Protocol[J]. Journal of Computer Research and Development, 2012, 49(11): 2424-2431.
    [9]Jin Yongming, Sun Huiping, Guan Zhi, Chen Zhong. Ownership Transfer Protocol for RFID Tag[J]. Journal of Computer Research and Development, 2011, 48(8): 1400-1405.
    [10]Deng Xubin, Zhu Yangyong. ReDE: A Regular Expression-Based Method for Extracting Biological Data[J]. Journal of Computer Research and Development, 2005, 42(12): 2184-2191.

Catalog

    Article views (762) PDF downloads (846) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return