【24h】

WIND: Workload-Aware INtrusion Detection

机译:WIND:感知工作负载的入侵检测

获取原文
获取原文并翻译 | 示例

摘要

Intrusion detection and prevention systems have become essential to the protection of critical networks across the Internet. Widely deployed IDS and IPS systems are based around a database of known malicious signatures. This database is growing quickly while at the same time the signatures are getting more complex. These trends place additional performance requirements on the rule-matching engine inside IDSs and IPSs, which check each signature against an incoming packet. Existing approaches to signature evaluation apply statically-defined optimizations that do not take into account the network in which the IDS or IPS is deployed or the characteristics of the signature database. We argue that for higher performance, IDS and IPS systems should adapt according to the workload, which includes the set of input signatures and the network traffic characteristics. To demonstrate this idea, we have developed an adaptive algorithm that systematically profiles attack signatures and network traffic to generate a high performance and memory-efficient packet inspection strategy. We have implemented our idea by building two distinct components over Snort: a profiler that analyzes the input rules and the observed network traffic to produce a packet inspection strategy, and an evaluation engine that pre-processes rules according to the strategy and evaluates incoming packets to determine the set of applicable signatures. We have conducted an extensive evaluation of our workload-aware Snort implementation on a collection of publicly available datasets and on live traffic from a border router at a large university network. Our evaluation shows that the workload-aware implementation outperforms Snort in the number of packets processed per second by a factor of up to 1.6x for all Snort rules and 2.7x for web-based rules with reduction in memory requirements. Similar comparison with Bro shows that the workload-aware implementation outperforms Bro by more than six times in most cases.
机译:入侵检测和防御系统对于保护Internet上的关键网络已经变得至关重要。广泛部署的IDS和IPS系统基于已知恶意签名的数据库。该数据库正在快速增长,同时签名变得越来越复杂。这些趋势对IDS和IPS内部的规则匹配引擎提出了额外的性能要求,这些引擎会根据传入的数据包检查每个签名。现有的签名评估方法应用了静态定义的优化,这些优化未考虑IDS或IPS所部署在的网络或签名数据库的特征。我们认为,为了获得更高的性能,IDS和IPS系统应该根据工作量进行调整,其中包括输入签名集和网络流量特征。为了证明这一想法,我们开发了一种自适应算法,该算法可以系统地分析攻击特征和网络流量,以生成高性能和内存有效的数据包检查策略。我们通过在Snort上构建两个不同的组件来实现我们的想法:一个分析器,它分析输入规则和观察到的网络流量以生成数据包检查策略,以及一个评估引擎,该引擎根据该策略对规则进行预处理并对输入的数据包进行评估确定适用的签名集。我们已经对可感知工作负载的Snort实施进行了广泛的评估,评估了一系列公开可用的数据集以及大型大学网络中边界路由器的实时流量。我们的评估表明,在所有Snort规则和每秒基于Web的规则中,可感知工作负载的实施方式每秒处理的数据包数量都比Snort高出1.6倍,而基于Web的规则则高达2.7倍,从而减少了内存需求。与Bro的类似比较表明,在大多数情况下,可感知工作负载的实施的性能要比Bro高出六倍以上。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号