Pattern Matching Applications: Today, pattern matching is used in numerous applications like text editing, compiling computer programs, and protecting private data during network monitoring activities. Protecting private data, while monitoring networks, represents one of the growing uses for pattern matching. In order to solve a network problem, a trouble shooter must monitor network traffic and examine its packet headers (e.g. Ethernet Header, IP Header, etc.). However, the payload portion of a packet may include a person’s personal information that needs to be protected. Pattern matching can be used to mask personal data in the payload portion of each packet prior to the packet being examined. This capability assists organizations with complying with regulations like HIPPA and PHI. Another use for pattern matching is filtering. When a match occurs, the action can be to either drop the packet or pass it. This type of application is applicable when a virus or malware is identified in a packet. In some cases, the action may include dropping the entire network session.
Typical Regular Expressions: A typical regular expression library could include the ability to search for the following types of data: · Credit Card Numbers · Phone Numbers · Zip Code Numbers · Email Addresses
· Postal AddressesTypical Pattern Matching Features: A user should easily be able to perform the following functions with a pattern matching system: · Have commonly used regular expressions available in a library. · Add additional regular expressions to the regular expression library by copying them from the plethora of expressions found on the Internet. · Test whether a regular expression matches a particular string without having to configure a network to send the string through the system. · Allow the user to mask data using a user selectable character. APCON delivers a pattern matching feature as part of its network and security visibility solution. This allows the inspection of the packet payload to look for specific data patterns and masks the matched data, improving data privacy and supporting compliance to HIPAA, PCI and internal best practices. For an example of a network pattern matching system, check out Apcon’s new pattern matching feature on the HyperEngine packet processor blade or contact Kevin Copestake, UK & Ireland Sales Manager firstname.lastname@example.org/ +44 (0) 7834 868628 for more information.
Compliance Regulations 1Health Insurance Portability and Accountability Act (HIPAA) 2Protected Health Information (PHI) Guest blog by APCON. For a link to the original blog plus related diagrams, please visit https://www.apcon.com/blog-entry/keeping-sensitive-data-hidden