Flexible pattern matching algorithm in Chinese strings

Presently the research on the security of network contents has faced the challenge of network breakthrough techniques. A popular Chinese network breakthrough technique is to jam malicious characters in key words, and/or replace the Chinese characters in key words with homonyms or homophones, or comp...

Full description

Saved in:
Bibliographic Details
Published in:Chinese Control Conference pp. 610 - 614
Main Authors: Zhou Xueguang, Zhang Huanguo
Format: Conference Proceeding
Language:Chinese
English
Published: IEEE 01.07.2008
Subjects:
ISSN:1934-1768
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract Presently the research on the security of network contents has faced the challenge of network breakthrough techniques. A popular Chinese network breakthrough technique is to jam malicious characters in key words, and/or replace the Chinese characters in key words with homonyms or homophones, or complicated Chinese characters. With this method some malicious web pages make themselves escape from the network filtering and intrusion detection. While most existing pattern matching algorithms in Chinese strings cannot detect this kind of attacks. In this paper we give a formulized definition of flexible pattern matching in Chinese strings, and compare the classical algorithms for pattern matching in strings, and choose the prefix searching strategy to realize the flexible algorithms for pattern matching in single-pattern string and multi-pattern string. Our algorithm can match the Chinese strings jammed with malicious characters, and partially resolve the Chinese network breakthrough problem that other classical matching algorithms in string cannot solve.
AbstractList Presently the research on the security of network contents has faced the challenge of network breakthrough techniques. A popular Chinese network breakthrough technique is to jam malicious characters in key words, and/or replace the Chinese characters in key words with homonyms or homophones, or complicated Chinese characters. With this method some malicious web pages make themselves escape from the network filtering and intrusion detection. While most existing pattern matching algorithms in Chinese strings cannot detect this kind of attacks. In this paper we give a formulized definition of flexible pattern matching in Chinese strings, and compare the classical algorithms for pattern matching in strings, and choose the prefix searching strategy to realize the flexible algorithms for pattern matching in single-pattern string and multi-pattern string. Our algorithm can match the Chinese strings jammed with malicious characters, and partially resolve the Chinese network breakthrough problem that other classical matching algorithms in string cannot solve.
Author Zhang Huanguo
Zhou Xueguang
Author_xml – sequence: 1
  surname: Zhou Xueguang
  fullname: Zhou Xueguang
  organization: Coll. of Electron. Eng., Naval Univ. of Eng., Wuhan
– sequence: 2
  surname: Zhang Huanguo
  fullname: Zhang Huanguo
BookMark eNotj0FqwzAQRVVIoXHaC7QbX8DOjCVrrGURTRMIdNOug2yNExXbCZYW7e0baFYf3oMHPxOL6TyxEM8IJSKYtd3urC0rgKZUGpRRdCcyMgCEhsAsxBKNVAWSbh5EFuM3gAaDcin0ZuCf0A6cX1xKPE_56FJ3CtMxd8PxPId0GvMw5faKOHIe03x18VHc926I_HTblfjavH3abbH_eN_Z130RkOpU9NRBDQhKemxVVxvjEX3VKAPMulfeEWhN7A1hK6lvDFUMFcqqa732rVyJl_9uYObDZQ6jm38Pt4_yD_PKRwI
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/CHICC.2008.4604947
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE Xplore
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Xplore
  url: https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISBN 7900719709
9787900719706
EndPage 614
ExternalDocumentID 4604947
Genre orig-research
GroupedDBID 29B
6IE
6IF
6IK
6IL
6IN
AAJGR
AAWTH
ABLEC
ACGFS
ADZIZ
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
CHZPO
IEGSK
IPLJI
M43
OCL
RIE
RIL
ID FETCH-LOGICAL-i175t-f7c0501043d1b4c599d11d28490ee6f4da70667ed971b37f8972e02132cbd6db3
IEDL.DBID RIE
ISICitedReferencesCount 3
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000259745800126&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 1934-1768
IngestDate Wed Aug 27 01:36:28 EDT 2025
IsPeerReviewed false
IsScholarly true
Language Chinese
English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i175t-f7c0501043d1b4c599d11d28490ee6f4da70667ed971b37f8972e02132cbd6db3
PageCount 5
ParticipantIDs ieee_primary_4604947
PublicationCentury 2000
PublicationDate 2008-July
PublicationDateYYYYMMDD 2008-07-01
PublicationDate_xml – month: 07
  year: 2008
  text: 2008-July
PublicationDecade 2000
PublicationTitle Chinese Control Conference
PublicationTitleAbbrev CHICC
PublicationYear 2008
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0060913
Score 1.6963011
Snippet Presently the research on the security of network contents has faced the challenge of network breakthrough techniques. A popular Chinese network breakthrough...
SourceID ieee
SourceType Publisher
StartPage 610
SubjectTerms Algorithm design and analysis
Chinese strings
Electronic mail
flexible pattern Matching
Heuristic algorithms
Jamming
Pattern matching
Security
Security content
Software algorithms
Title Flexible pattern matching algorithm in Chinese strings
URI https://ieeexplore.ieee.org/document/4604947
WOSCitedRecordID wos000259745800126&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3LT8IwGP8CxINefIDxnR48OlkfW9czkXgwhIMm3Mj6wiU4CAz_fvttgJp48dY0zdK1yffb2t8D4N662OtE6kgmzEdC6izKJaWhGHLlY21E7Gqh8IscjbLJRI1b8LDXwjjnavKZe8RmfZdvF2aDR2V9kaKbiWxDW8q00Wrtqm6K_pbNDbJA08NsJ5CJVR-PrwYNbXL7hF9RKjWSDI__N4cT6H1L8sh4Dzan0HLlGRz9cBPsQjpEc0s9d2RZm2aWJHyN1lRJks9ni1VRvX-QoiQYme3WjmBiRzlb9-Bt-PQ6eI62sQhREbC-irw0cYK_UdxSLUyilKXUBphRYV1TL2wukbnqrJJUc-kzJZkLUM6Z0Rgfxc-hUy5KdwGEc89yGgbrXKBrS2aYVYZRndmMac8uoYsrMF02zhfT7ctf_d19DYcNmwLJrDfQqVYbdwsH5rMq1qu7eru-ANkLlC0
linkProvider IEEE
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3LT8IwGP-CaKJefIDxbQ8enazdo-uZSDAi4YAJN7K-cAluBIZ_v_u2gZp48dY0zdK1yffb2t8D4F4b18qAS4cHzDo-l5ETc0qLYugJ60rlu6YUCg_4cBhNJmLUgIetFsYYU5LPzCM2y7t8nak1HpV1_BDdTPgO7GJyVq3W2tTdEB0uqztkH20Po41ExhUdPMDqVsTJ-hm_wlRKLOkd_W8Wx9D-FuWR0RZuTqBh0lM4_OEn2IKwh_aWcm7IorTNTEnxPVqSJUk8n2XLJH__IElKMDTbrAzBzI50tmrDW-9p3O07dTCCkxRonzuWKzfAHylPU-mrQAhNqS6ARhQrG1pfxxy5q0YLTqXHbSQ4MwWYe0xJDJDyzqCZZqk5B-J5lsW0GCxjH31bIsW0UIzKSEdMWnYBLVyB6aLyvpjWL3_5d_cd7PfHr4Pp4Hn4cgUHFbcCqa3X0MyXa3MDe-ozT1bL23LrvgDGGZd2
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=proceeding&rft.title=Chinese+Control+Conference&rft.atitle=Flexible+pattern+matching+algorithm+in+Chinese+strings&rft.au=Zhou+Xueguang&rft.au=Zhang+Huanguo&rft.date=2008-07-01&rft.pub=IEEE&rft.issn=1934-1768&rft.spage=610&rft.epage=614&rft_id=info:doi/10.1109%2FCHICC.2008.4604947&rft.externalDocID=4604947
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1934-1768&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1934-1768&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1934-1768&client=summon