An active splitter architecture for intrusion detection and prevention
State-of-the-art high-speed network intrusion detection and prevention systems are often designed using multiple intrusion detection sensors operating in parallel coupled with a suitable front-end load-balancing traffic splitter. In this paper, we argue that, rather than just passively providing gen...
Gespeichert in:
Veröffentlicht in: | IEEE transactions on dependable and secure computing 2006-01, Vol.3 (1), p.31-44 |
---|---|
Hauptverfasser: | , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 44 |
---|---|
container_issue | 1 |
container_start_page | 31 |
container_title | IEEE transactions on dependable and secure computing |
container_volume | 3 |
creator | Xinidis, K. Charitakis, I. Antonatos, S. Anagnostakis, K.G. Markatos, E.P. |
description | State-of-the-art high-speed network intrusion detection and prevention systems are often designed using multiple intrusion detection sensors operating in parallel coupled with a suitable front-end load-balancing traffic splitter. In this paper, we argue that, rather than just passively providing generic load distribution, traffic splitters should implement more active operations on the traffic stream, with the goal of reducing the load on the sensors. We present an active splitter architecture and three methods for improving performance. The first is early filtering/forwarding, where a fraction of the packets is processed on the splitter instead of the sensors. The second is the use of locality buffering, where the splitter reorders packets in a way that improves memory access locality on the sensors. The third is the use of cumulative acknowledgments, a method that optimizes the coordination between the traffic splitter and the sensors. Our experiments suggest that early filtering reduces the number of packets to be processed by 32 percent, giving an 8 percent increase in sensor performance, locality buffers improve sensor performance by 10-18 percent, while cumulative acknowledgments improve performance by 50-90 percent. We have also developed a prototype active splitter on an IXP1200 network processor and show that the cost of the proposed approach is reasonable. |
doi_str_mv | 10.1109/TDSC.2006.6 |
format | Article |
fullrecord | <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_proquest_miscellaneous_743317487</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>1593585</ieee_id><sourcerecordid>28029903</sourcerecordid><originalsourceid>FETCH-LOGICAL-c375t-79bd62611ea2a043f7e1b8fb40372e51400a061b442bd8680066765b1ce7d49c3</originalsourceid><addsrcrecordid>eNqF0T1LxEAQBuAgCuppZWkTLLSQnDP7vaWcnyBYeNbLJplg5EzO3UTw37vhBMFCq50dHgZe3iw7Qpgjgr1YXj0t5gxAzdVWtodWYAGAZjvNUshCWo272X6MrwBMGCv2spvLLvfV0H5QHterdhgo5D5UL-1A1TAGyps-5G03hDG2fZfXNO2nyXd1vg70Qd30Pch2Gr-KdPj9zrLnm-vl4q54eLy9X1w-FBXXcii0LWvFFCJ55kHwRhOWpikFcM1IogDwoLAUgpW1USYlUVrJEivStbAVn2Vnm7vr0L-PFAf31saKVivfUT9GZ1IoblCIf6UWnKMWRid5-qdkBpi1wBM8-QVf-zF0Ka9joCSmXDah8w2qQh9joMatQ_vmw6dDcFNJbirJTSU5lfTxRrdE9COl5dJI_gXBF4t_</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>206516119</pqid></control><display><type>article</type><title>An active splitter architecture for intrusion detection and prevention</title><source>IEEE Electronic Library (IEL)</source><creator>Xinidis, K. ; Charitakis, I. ; Antonatos, S. ; Anagnostakis, K.G. ; Markatos, E.P.</creator><creatorcontrib>Xinidis, K. ; Charitakis, I. ; Antonatos, S. ; Anagnostakis, K.G. ; Markatos, E.P.</creatorcontrib><description>State-of-the-art high-speed network intrusion detection and prevention systems are often designed using multiple intrusion detection sensors operating in parallel coupled with a suitable front-end load-balancing traffic splitter. In this paper, we argue that, rather than just passively providing generic load distribution, traffic splitters should implement more active operations on the traffic stream, with the goal of reducing the load on the sensors. We present an active splitter architecture and three methods for improving performance. The first is early filtering/forwarding, where a fraction of the packets is processed on the splitter instead of the sensors. The second is the use of locality buffering, where the splitter reorders packets in a way that improves memory access locality on the sensors. The third is the use of cumulative acknowledgments, a method that optimizes the coordination between the traffic splitter and the sensors. Our experiments suggest that early filtering reduces the number of packets to be processed by 32 percent, giving an 8 percent increase in sensor performance, locality buffers improve sensor performance by 10-18 percent, while cumulative acknowledgments improve performance by 50-90 percent. We have also developed a prototype active splitter on an IXP1200 network processor and show that the cost of the proposed approach is reasonable.</description><identifier>ISSN: 1545-5971</identifier><identifier>EISSN: 1941-0018</identifier><identifier>DOI: 10.1109/TDSC.2006.6</identifier><identifier>CODEN: ITDSCM</identifier><language>eng</language><publisher>Washington: IEEE</publisher><subject>Alliances ; Architecture ; Central processing units ; Computer networks ; Costs ; CPUs ; Design ; Filtering ; Filtration ; Flexibility ; High-speed networks ; Inspection ; Intrusion ; Intrusion detection ; intrusion detection and prevention ; Intrusion detection systems ; network processors ; Network security ; Network-level security and protection ; Networks ; Optimization methods ; Performance enhancement ; Prevention ; Protocols ; Prototypes ; Sensor systems ; Sensors ; Software ; Studies ; Telecommunication traffic ; Traffic congestion ; Traffic engineering ; Traffic flow ; Workloads</subject><ispartof>IEEE transactions on dependable and secure computing, 2006-01, Vol.3 (1), p.31-44</ispartof><rights>Copyright IEEE Computer Society Jan-Mar 2006</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c375t-79bd62611ea2a043f7e1b8fb40372e51400a061b442bd8680066765b1ce7d49c3</citedby><cites>FETCH-LOGICAL-c375t-79bd62611ea2a043f7e1b8fb40372e51400a061b442bd8680066765b1ce7d49c3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/1593585$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,778,782,794,27907,27908,54741</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/1593585$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Xinidis, K.</creatorcontrib><creatorcontrib>Charitakis, I.</creatorcontrib><creatorcontrib>Antonatos, S.</creatorcontrib><creatorcontrib>Anagnostakis, K.G.</creatorcontrib><creatorcontrib>Markatos, E.P.</creatorcontrib><title>An active splitter architecture for intrusion detection and prevention</title><title>IEEE transactions on dependable and secure computing</title><addtitle>TDSC</addtitle><description>State-of-the-art high-speed network intrusion detection and prevention systems are often designed using multiple intrusion detection sensors operating in parallel coupled with a suitable front-end load-balancing traffic splitter. In this paper, we argue that, rather than just passively providing generic load distribution, traffic splitters should implement more active operations on the traffic stream, with the goal of reducing the load on the sensors. We present an active splitter architecture and three methods for improving performance. The first is early filtering/forwarding, where a fraction of the packets is processed on the splitter instead of the sensors. The second is the use of locality buffering, where the splitter reorders packets in a way that improves memory access locality on the sensors. The third is the use of cumulative acknowledgments, a method that optimizes the coordination between the traffic splitter and the sensors. Our experiments suggest that early filtering reduces the number of packets to be processed by 32 percent, giving an 8 percent increase in sensor performance, locality buffers improve sensor performance by 10-18 percent, while cumulative acknowledgments improve performance by 50-90 percent. We have also developed a prototype active splitter on an IXP1200 network processor and show that the cost of the proposed approach is reasonable.</description><subject>Alliances</subject><subject>Architecture</subject><subject>Central processing units</subject><subject>Computer networks</subject><subject>Costs</subject><subject>CPUs</subject><subject>Design</subject><subject>Filtering</subject><subject>Filtration</subject><subject>Flexibility</subject><subject>High-speed networks</subject><subject>Inspection</subject><subject>Intrusion</subject><subject>Intrusion detection</subject><subject>intrusion detection and prevention</subject><subject>Intrusion detection systems</subject><subject>network processors</subject><subject>Network security</subject><subject>Network-level security and protection</subject><subject>Networks</subject><subject>Optimization methods</subject><subject>Performance enhancement</subject><subject>Prevention</subject><subject>Protocols</subject><subject>Prototypes</subject><subject>Sensor systems</subject><subject>Sensors</subject><subject>Software</subject><subject>Studies</subject><subject>Telecommunication traffic</subject><subject>Traffic congestion</subject><subject>Traffic engineering</subject><subject>Traffic flow</subject><subject>Workloads</subject><issn>1545-5971</issn><issn>1941-0018</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2006</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNqF0T1LxEAQBuAgCuppZWkTLLSQnDP7vaWcnyBYeNbLJplg5EzO3UTw37vhBMFCq50dHgZe3iw7Qpgjgr1YXj0t5gxAzdVWtodWYAGAZjvNUshCWo272X6MrwBMGCv2spvLLvfV0H5QHterdhgo5D5UL-1A1TAGyps-5G03hDG2fZfXNO2nyXd1vg70Qd30Pch2Gr-KdPj9zrLnm-vl4q54eLy9X1w-FBXXcii0LWvFFCJ55kHwRhOWpikFcM1IogDwoLAUgpW1USYlUVrJEivStbAVn2Vnm7vr0L-PFAf31saKVivfUT9GZ1IoblCIf6UWnKMWRid5-qdkBpi1wBM8-QVf-zF0Ka9joCSmXDah8w2qQh9joMatQ_vmw6dDcFNJbirJTSU5lfTxRrdE9COl5dJI_gXBF4t_</recordid><startdate>200601</startdate><enddate>200601</enddate><creator>Xinidis, K.</creator><creator>Charitakis, I.</creator><creator>Antonatos, S.</creator><creator>Anagnostakis, K.G.</creator><creator>Markatos, E.P.</creator><general>IEEE</general><general>IEEE Computer Society</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7WY</scope><scope>7WZ</scope><scope>7XB</scope><scope>87Z</scope><scope>8AL</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8FL</scope><scope>ABJCF</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BEZIV</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FRNLG</scope><scope>F~G</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K60</scope><scope>K6~</scope><scope>K7-</scope><scope>L.-</scope><scope>L6V</scope><scope>M0C</scope><scope>M0N</scope><scope>M7S</scope><scope>P5Z</scope><scope>P62</scope><scope>PQBIZ</scope><scope>PQBZA</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>PTHSS</scope><scope>PYYUZ</scope><scope>Q9U</scope><scope>7SC</scope><scope>8FD</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>7SP</scope><scope>F28</scope><scope>FR3</scope></search><sort><creationdate>200601</creationdate><title>An active splitter architecture for intrusion detection and prevention</title><author>Xinidis, K. ; Charitakis, I. ; Antonatos, S. ; Anagnostakis, K.G. ; Markatos, E.P.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c375t-79bd62611ea2a043f7e1b8fb40372e51400a061b442bd8680066765b1ce7d49c3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2006</creationdate><topic>Alliances</topic><topic>Architecture</topic><topic>Central processing units</topic><topic>Computer networks</topic><topic>Costs</topic><topic>CPUs</topic><topic>Design</topic><topic>Filtering</topic><topic>Filtration</topic><topic>Flexibility</topic><topic>High-speed networks</topic><topic>Inspection</topic><topic>Intrusion</topic><topic>Intrusion detection</topic><topic>intrusion detection and prevention</topic><topic>Intrusion detection systems</topic><topic>network processors</topic><topic>Network security</topic><topic>Network-level security and protection</topic><topic>Networks</topic><topic>Optimization methods</topic><topic>Performance enhancement</topic><topic>Prevention</topic><topic>Protocols</topic><topic>Prototypes</topic><topic>Sensor systems</topic><topic>Sensors</topic><topic>Software</topic><topic>Studies</topic><topic>Telecommunication traffic</topic><topic>Traffic congestion</topic><topic>Traffic engineering</topic><topic>Traffic flow</topic><topic>Workloads</topic><toplevel>online_resources</toplevel><creatorcontrib>Xinidis, K.</creatorcontrib><creatorcontrib>Charitakis, I.</creatorcontrib><creatorcontrib>Antonatos, S.</creatorcontrib><creatorcontrib>Anagnostakis, K.G.</creatorcontrib><creatorcontrib>Markatos, E.P.</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>ABI/INFORM Collection</collection><collection>ABI/INFORM Global (PDF only)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ABI/INFORM Global (Alumni Edition)</collection><collection>Computing Database (Alumni Edition)</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection (Alumni Edition)</collection><collection>Materials Science & Engineering Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Business Premium Collection</collection><collection>Technology Collection (ProQuest)</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>Business Premium Collection (Alumni)</collection><collection>ABI/INFORM Global (Corporate)</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Business Collection (Alumni Edition)</collection><collection>ProQuest Business Collection</collection><collection>Computer Science Database</collection><collection>ABI/INFORM Professional Advanced</collection><collection>ProQuest Engineering Collection</collection><collection>ABI/INFORM Global</collection><collection>Computing Database</collection><collection>Engineering Database</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>ProQuest One Business</collection><collection>ProQuest One Business (Alumni)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>Engineering Collection</collection><collection>ABI/INFORM Collection China</collection><collection>ProQuest Central Basic</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Electronics & Communications Abstracts</collection><collection>ANTE: Abstracts in New Technology & Engineering</collection><collection>Engineering Research Database</collection><jtitle>IEEE transactions on dependable and secure computing</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Xinidis, K.</au><au>Charitakis, I.</au><au>Antonatos, S.</au><au>Anagnostakis, K.G.</au><au>Markatos, E.P.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>An active splitter architecture for intrusion detection and prevention</atitle><jtitle>IEEE transactions on dependable and secure computing</jtitle><stitle>TDSC</stitle><date>2006-01</date><risdate>2006</risdate><volume>3</volume><issue>1</issue><spage>31</spage><epage>44</epage><pages>31-44</pages><issn>1545-5971</issn><eissn>1941-0018</eissn><coden>ITDSCM</coden><abstract>State-of-the-art high-speed network intrusion detection and prevention systems are often designed using multiple intrusion detection sensors operating in parallel coupled with a suitable front-end load-balancing traffic splitter. In this paper, we argue that, rather than just passively providing generic load distribution, traffic splitters should implement more active operations on the traffic stream, with the goal of reducing the load on the sensors. We present an active splitter architecture and three methods for improving performance. The first is early filtering/forwarding, where a fraction of the packets is processed on the splitter instead of the sensors. The second is the use of locality buffering, where the splitter reorders packets in a way that improves memory access locality on the sensors. The third is the use of cumulative acknowledgments, a method that optimizes the coordination between the traffic splitter and the sensors. Our experiments suggest that early filtering reduces the number of packets to be processed by 32 percent, giving an 8 percent increase in sensor performance, locality buffers improve sensor performance by 10-18 percent, while cumulative acknowledgments improve performance by 50-90 percent. We have also developed a prototype active splitter on an IXP1200 network processor and show that the cost of the proposed approach is reasonable.</abstract><cop>Washington</cop><pub>IEEE</pub><doi>10.1109/TDSC.2006.6</doi><tpages>14</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 1545-5971 |
ispartof | IEEE transactions on dependable and secure computing, 2006-01, Vol.3 (1), p.31-44 |
issn | 1545-5971 1941-0018 |
language | eng |
recordid | cdi_proquest_miscellaneous_743317487 |
source | IEEE Electronic Library (IEL) |
subjects | Alliances Architecture Central processing units Computer networks Costs CPUs Design Filtering Filtration Flexibility High-speed networks Inspection Intrusion Intrusion detection intrusion detection and prevention Intrusion detection systems network processors Network security Network-level security and protection Networks Optimization methods Performance enhancement Prevention Protocols Prototypes Sensor systems Sensors Software Studies Telecommunication traffic Traffic congestion Traffic engineering Traffic flow Workloads |
title | An active splitter architecture for intrusion detection and prevention |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-16T07%3A00%3A13IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=An%20active%20splitter%20architecture%20for%20intrusion%20detection%20and%20prevention&rft.jtitle=IEEE%20transactions%20on%20dependable%20and%20secure%20computing&rft.au=Xinidis,%20K.&rft.date=2006-01&rft.volume=3&rft.issue=1&rft.spage=31&rft.epage=44&rft.pages=31-44&rft.issn=1545-5971&rft.eissn=1941-0018&rft.coden=ITDSCM&rft_id=info:doi/10.1109/TDSC.2006.6&rft_dat=%3Cproquest_RIE%3E28029903%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=206516119&rft_id=info:pmid/&rft_ieee_id=1593585&rfr_iscdi=true |