Open Access Open Access  Restricted Access Subscription or Fee Access

Pattern Detection Using BiTCAM

K. Billy Sadhu Sharma, J. Bruntha, B. Arivuselvam

Abstract


Pattern matching has been an important technique in information retrieval and text editing for many years. Recently it has been applied to internet security matching to detect virus, worms, intrusions, etc., because of its accuracy. Pattern matching in large is generally referred to string matching. String matching is based on the process of detection and comparison of an input data and an output data. The solution described out performs most current implementations in terms of speed and memory requirement and outperforms BiCAM and TCAM based structures. In this paper a BiTCAM (unifying binary and ternary CAMs) is proposed to achieve a high-throughput, design for pattern matching which can be utilized in designs for mobile devices and other applications.

Keywords


Associative Memories, Content-Addressable Memory, Pattern Matching, Binary CAM, Ternary CAM, Intrusion Detection System.

Full Text:

PDF

References


―An Adaptively Dividable Dual-Port BiTCAM for Virus-Detection Processors in Mobile Devices‖ Chao-Ching Wang, Chieh-Jen Cheng, Tien-Fu Chen, and Jinn-Shyan Wang, Member, IEEE JOURNAL OF SOLID-STATE CIRCUITS, VOL. 44, NO. 5, MAY 2009.

K. J. Lin and C. W. Wu, ―A low-power CAM design for LZ data compression,‖ IEEE Trans. Computer., vol. 49, no. 10, pp. 1139–1145, 2000.

Y. H. Cho and W. H. Mangione-Smith, ―A pattern matching coprocessor for network security,‖ in Proc. IEEE 2005 Int. Conf. Design Automation, pp. 234–239.

L. Tan and T. Sherwood, ―A high throughput string matching architecture for intrusion detection and prevention,‖ in Proc. IEEE Int. Symp.Computer Architecture, 2005, pp. 112–122.

M. Yadav, A. Venkatachaliah, and P. D. Franzon, ―Hardware architecture of a parallel pattern matching engine,‖ in Proc. IEEE Int. Symp. Circuits and Systems, 2007, pp. 1369–1372.

C. C. Wang, C. J. Cheng, T. F. Chen, and J. S. Wang, ―An adaptively dividable dual-ported BiTCAM for virus detection processors in mobile devices,‖ in IEEE Int. Solid-State Circuits Conf. Dig., 2008, pp.390–391.

C. C. Wang, J. S. Wang, and C. W. Yeh, ―High-speed and low-power design techniques for TCAM macros,‖ IEEE J. Solid-State Circuits, vol. 43, no. 2, pp. 530–540, Feb. 2008.

J. S. Wang, H. Y. Li, C. C. Chen, and C. W. Yeh, ―An AND-type match-line scheme for energy-efficient content addressable memories "in IEEE Int. Solid-State Circuits Conf. Dig., 2005, pp. 464–610.

N. F. Huang, W. E. Chen, J. Y. Luo, and J.M. Chen, ―Design of multi field IPv6 packet classifiers using ternary CAMs,‖ in Proc. IEEE Int.Conf. Global Telecommunications, 2001, vol. 3, pp. 1877–1881.

S. Wu and U. Manber, ―A fast algorithm for multi-pattern searching,‖ Univ. Arizona, Report TR-94-17, 1994.

B. H. Bloom, ―Space/time trade-offs in hash coding with allowable errors,‖ Commun. ACM, vol. 13, no. 7, pp. 422–426, 1970.

R. Franklin, D. Carver, and B. L. Hutchings, ―Assisting Network Intrusion Detection with Reconfigurable Hardware,‖ in Proc. of the 10th annual IEEE symposium on Field-Progammable Custom Computing Machines (FCCM’02), Napa, California, USA, April 2002, pp.121-130.

Young, et al., ―Deep Network Packet Filter Design for Reconfigurable Devices,‖ in Proc. of the 12th Conference on Field Programmable Logic and Applications (FPL), Montpellier, France, September 2002.

Young, et al., ―Programmable Hardware for Deep Packet Filtering on a Large Signature Set,‖ in Proc. of the First IBM Watson P=ac2 Conference, Yorktown, NY, October 2004.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.