2025-02-21T08:19:44-05:00 DEBUG: VuFindSearch\Backend\Solr\Connector: Query fl=%2A&wt=json&json.nl=arrarr&q=id%3A%22mcmtechkpnueduua-article-251081%22&qt=morelikethis&rows=5
2025-02-21T08:19:44-05:00 DEBUG: VuFindSearch\Backend\Solr\Connector: => GET http://localhost:8983/solr/biblio/select?fl=%2A&wt=json&json.nl=arrarr&q=id%3A%22mcmtechkpnueduua-article-251081%22&qt=morelikethis&rows=5
2025-02-21T08:19:44-05:00 DEBUG: VuFindSearch\Backend\Solr\Connector: <= 200 OK
2025-02-21T08:19:44-05:00 DEBUG: Deserialized SOLR response
Застосування алгоритма Ахо-Корасіка для вдосконалення система виявлення вторгнень
One of the main goals of studying pattern matching techniques is their significant role in real-world applications, such as the intrusion detection systems branch. The purpose of the network attack detection systems NIDS is to protect the infocommunication network from unauthorized access. This arti...
Saved in:
Main Authors: | , |
---|---|
Format: | Article |
Language: | Ukrainian |
Published: |
Kamianets-Podilskyi National Ivan Ohiienko University
2021
|
Online Access: | http://mcm-tech.kpnu.edu.ua/article/view/251081 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | One of the main goals of studying pattern matching techniques is their significant role in real-world applications, such as the intrusion detection systems branch. The purpose of the network attack detection systems NIDS is to protect the infocommunication network from unauthorized access. This article provides an analysis of the exact match and fuzzy matching methods, and discusses a new implementation of the classic Aho-Korasik pattern matching algorithm at the hardware level. The proposed approach to the implementation of the Aho-Korasik algorithm can make it possible to ensure the efficient use of resources, such as memory and energy |
---|