Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A Deep Packet Inspection Method Based on Finite Automata

A technology of in-depth message detection and finite automata, applied in digital transmission systems, electrical components, transmission systems, etc., can solve the problems of large and long detection circuits and difficulty in making logic circuits, so as to improve the working speed and data Throughput rate, optimized logic structure, and area-saving effect

Active Publication Date: 2017-04-12
武汉二进制半导体有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If you pursue a faster detection speed, you need to expand the detection circuit as much as possible, that is to say, a larger-scale detection circuit to meet the rapidly expanding sensitive characters; but if the detection circuit area is too long, even in the most advanced 22nm process However, it is also difficult to completely make all the rules into logic circuits and integrate them on a silicon chip

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Deep Packet Inspection Method Based on Finite Automata
  • A Deep Packet Inspection Method Based on Finite Automata
  • A Deep Packet Inspection Method Based on Finite Automata

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] The present invention will be described in further detail below in conjunction with the accompanying drawings and embodiments.

[0024] The present invention is based on the depth message detection method of FA, comprises the following steps:

[0025] S1. In the initialization phase of system power-on, the CPU writes all default configurations into the third-level memory by issuing instructions, and each level can have multiple memories. Among them, the first-level memory stores the first two characters of all violating character strings, the second-level memory stores the characters included in all violating character strings, and the third-level memory stores the corresponding value and the corresponding value of the violating string after hash calculation. Offending collection number.

[0026] In this example, if Figure 4 As shown, the first-level memory uses 26 letter cross indexes as address items, so there are currently 676 addresses. In subsequent versions, ac...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a deep massage detection method based on finite automata, and relates to the field of data messages in high-speed switching networks. The deep massage detection method based on the finite automata comprises the following steps that a CPU writes all default configurations in three-level memories in an instruction giving mode; according to preset configurations, an input data package is decomposed into a plurality of continuous character strings, each character string comprises a plurality of text information fragments, and a violation set to which each text information fragment belongs is marked; the text information fragments in the data package are detected at a constant speed through the DFA, and the violation sets to which the text information fragments belong are obtained by searching the three-level memories; the numbers of all the detected violation sets are packaged into a new data package in the set form, and the new data package is sent to the NFA; whether the various numbers, contained in the current data package, of the violation sets are allowed to coexist in the same data package is judged, if yes, the data package is forwarded normally, and if not, discarding or other types of processing are carried out. By means of the deep massage detection method based on the finite automata, related items can be combined effectively, the scale of a logic circuit is reduced, and therefore engineering realization requirements are satisfied.

Description

technical field [0001] The invention relates to the field of data messages in a high-speed switching network, and specifically relates to a deep message detection method based on a finite automaton. Background technique [0002] The Internet is the fastest-growing information technology in the 20th century. With the improvement of broadband technology and the expansion of Internet scale, the amount of Internet data is also increasing, and information security technology is increasingly becoming the core technology for ensuring national security. In the past ten years, the bandwidth of Ethernet network infrastructure has expanded from 10Gbit / s to 40Gbit / s to 100Gbit / s. Correspondingly, in order to adapt to the rapid growth of controllability and visibility based on protocols, content, and applications, network communication devices must have corresponding communication processing mechanisms. Especially from the perspective of information security, secret-related units such a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/26
Inventor 朱健飞张磊磊
Owner 武汉二进制半导体有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products