Some researches at IBM (i think) developed an algorithm called 'teresias' (named for the blind seer of greek mythology), the purpose of which was to discover all the maximal patterns present in several protein chains. It was successfully adapted by a group somewhere to recognize known network intrusion attempts. I have read most of the paper that the IBM group wrote, and it sounds to me like your problem could be solved by the same approach.
I don't know where to find the paper or any online information off-hand, but if you email me at mlogan@ccs.neu.edu I will dig up the paper and let you know what journal it appeared in.
Good luck,
Mark
-
Are you posting in the right place? Check out Where do I post X? to know for sure.
-
Posts may use any of the Perl Monks Approved HTML tags. Currently these include the following:
<code> <a> <b> <big>
<blockquote> <br /> <dd>
<dl> <dt> <em> <font>
<h1> <h2> <h3> <h4>
<h5> <h6> <hr /> <i>
<li> <nbsp> <ol> <p>
<small> <strike> <strong>
<sub> <sup> <table>
<td> <th> <tr> <tt>
<u> <ul>
-
Snippets of code should be wrapped in
<code> tags not
<pre> tags. In fact, <pre>
tags should generally be avoided. If they must
be used, extreme care should be
taken to ensure that their contents do not
have long lines (<70 chars), in order to prevent
horizontal scrolling (and possible janitor
intervention).
-
Want more info? How to link
or How to display code and escape characters
are good places to start.
|