Beruflich Dokumente
Kultur Dokumente
By
Outline:
Introduction
Objective
Conventional technique and proposed solution
Simulation and synthesis results
Comparisons
Conclusion and future scope
References
Introduction
Intrusion detection covers a broad range of digital security
intelligence , confidentiality.
calm
Aho-corasic pattern matching: prmv
hksd
In AC pattern matching algorithm the first cell
letter of given input string will be searched call abcd
with the first letter of all patterns in data
call
hany
hall
Objective of the project:
In this project, we propose a memory-efficient pattern
matching algorithm which can significantly reduce the number
of states and transitions by merging pseudo-equivalent states
while maintaining correctness of string matching.
Fig(a):Traditional approach(fsm)
Curr state : The state in which the memory is stored is called the
curr state
After merging
Fig(a):FSM Fig(b):MERG_FSM
Each state stores the pathVec and ifFinal as
the form, pathVec_ ifFinal
Programming Language:VHDL.
Project simulation results (Wave form of pattern not matched)
Project simulation results (Wave form of pattern two matched)
Project simulation results (Wave form of pattern not matched)
Design summary report of ac_algorithm
Design summary report of proposed ac_algorithm code
Conclusion:
We have presented a high-speed and scalable pattern matching algorithm that uses
multi-character transitions on finite state automata to increase the throughput, and
also leverages a clever transition optimization technique to reduce the memory
requirements.
Since the number of states in merg_FSM can be drastically smaller than the original
FSM, it results in a much smaller memory size.