Академический Документы
Профессиональный Документы
Культура Документы
Presented by
CONTENTS
Introduction Aim Abstract Algorithm Block Diagram Tools Comparison Advantages Applications Conclusion References
AIM
Network security has always been an important issue and its
ABSTRACT
In this project proposed to achieve a high-throughput, low-
VIRUS
A virus is a computer program that can copy itself and infect a computer. The term "virus" is also commonly but erroneously used to refer to other types of malware, including but not limited to adware and spyware programs that do not have the reproductive ability. A true virus can spread from one computer to another (in some form of executable code)
2) The scalability of handling more than ten thousands patterns is required for
EXISTING SYSTEM
Aho and Corasicks algorithm (AC), which introduces a linear-time algorithm for multi-pattern search with a large finitestatema-chine.
In contrast, heuristic approaches are based on the Boyer- Moore algorithm, which was introduced in 1977. Its key feature is the shift value,which shifts the algorithms search window formultiple characters when it encounters a mismatch.
USED ALGORITHM
BLOOM ALGORITHM
Wu-Manber algorithms and have even developed for specialized circuits to increase the scanning speed
BLOCK DIAGRAM
Tools
Xilinx ISE 14.3 VHDL
COMPARISON TABLE
Quantity Existing work
126.861MHz 5.310ns 14752 29504 29504 227028KB 376
Proposed work
534.334MHz 5.310ns 777 770 1216 227264KB 263
Maximum Frequency Minimum period Number of slice registers Number used as Flip Flops Number of 4 input LUTs Peak memory usage Number of bonded IOBs
ADVANTAGES
high-throughput low-power low-cost
DIS-ADVANTAGES
. In this project we are dealing with three states(1 0 and X).
APPLICATIONS
In wireless devices like Bluetooth, Infrared rays communication.
CONCLUSION
Many previous designs have claimed to provide high performance, but the memory gap created by using external memory decreases performance because of the increasing size of virus databases.
Furthermore, limited resources restrict the practicality of these algorithms for embedded network security systems. Two-phase heuristic algorithms are a solution with a tradeoff between performance and cost due to an efficient filter table existing in internal memory; however, their performance is easily threatened by malicious attacks.
REFERENCES
K. J. Lin and C. W. Wu, A low-power CAM design for LZ data compression,IEEE Trans. Comput., vol. 49, no. 10, pp. 11391145, 2000. T. Ikenaga and T. Ogura, A fully parallel 1-MbCAMLSI for real-time pixel-parallel image processing, IEEE J.Solid-State Circuits, vol. 35, no. 4, pp. 536544, 2000 N. F. Huang, W. E. Chen, J. Y. Luo, and J. M. Chen, Design of multifield IPv6 packet classifiers using ternary CAMs, in Proc. IEEE Int. Conf. Global Telecommunications, 2001, vol. 3, pp. 18771881. Y. H. Cho and W. H. Mangione-Smith, A pattern matching coprocessor for network security, in Proc. IEEE 2005 Int. Conf. Design Automation,pp. 234239. L. Tan and T. Sherwood, A high throughput string matching architecture for intrusion detection and prevention, in Proc. IEEE Int. Symp. Computer Architecture, 2005, pp. 112 122.
M. Yadav, A. Venkatachaliah, and P. D. Franzon, Hardware architecture of a parallel pattern matching engine, in Proc. IEEE Int. Symp. Circuits and Systems, 2007, pp. 13691372.
THANK YOU