Two-Stage Decomposition of SNORT Rules towards Efficient Hardware Implementation

被引:5
作者
Chen, Hao [1 ]
Summerville, Douglas H. [1 ]
Chen, Yu [1 ]
机构
[1] SUNY Binghamton, Dept Elect & Comp Engn, Binghamton, NY 13902 USA
来源
2009 7TH INTERNATIONAL WORKSHOP ON THE DESIGN OF RELIABLE COMMUNICATION NETWORKS (DRCN 2009) | 2009年
关键词
Network Intrusion Detection Systems (NIDS); Security; Finite State Machine; Scalability; Decompose; FPGAs;
D O I
10.1109/DRCN.2009.5339986
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The performance gap between the execution speed of security software and the amount of data to be processed is ever widening. A common solution is to close the performance gap through hardware implementation of security functions. However, continuously expanding signature databases have become a major impediment to achieving scalable hardware based pattern matching. Additionally, evolutionary rule databases have necessitated real time online updating for reconfigurable hardware implementations. Based on the observation that signature patterns are constructed from combinations of a limited number of primary patterns, we propose to decompose the Snort signature patterns. These smaller primary pattern sets can be stored along with their associations to allow dynamic signature pattern reconstruction. Not only does the matching operation potentially become more scalable, but the real time online updating task is simplified. The approach is verified with patterns from the latest version of the Snort rule database. The experimental results show that after decomposition, a reduction in size of over 77% can be achieved on Snort signature patterns.
引用
收藏
页码:359 / 366
页数:8
相关论文
共 18 条
[1]  
ALDWAIRI M, 2005, SIGARCH COMPUT A MAR, V33
[2]  
ATTIG M, 2005, 13 ANN P HOT INT HOT
[3]  
BAKER Z, 2004, P 12 ANN IEEE S FIEL
[4]   Regular expression matching for reconfigurable packet inspection [J].
Bispo, Joao ;
Sourdis, Ioannis ;
Cardoso, Joao M. P. ;
Vassiliadis, Stamatis .
2006 IEEE INTERNATIONAL CONFERENCE ON FIELD PROGRAMMABLE TECHNOLOGY, PROCEEDINGS, 2006, :119-126
[5]  
Broder Andrei, 2004, Internet Mathematics, V1, P485, DOI DOI 10.1080/15427951.2004.10129096
[6]  
CHEN H, 2009, 2 STAGE DECOMPOSITIO
[7]  
CHO YH, 2004, WORKSH ARCH SUPP SEC
[8]  
CLARK CR, 2004, IEEE S FIELD PROGR C
[9]   Deep packet inspection using parallel bloom filters [J].
Dharmapurikar, S ;
Krishnamurthy, P ;
Sproull, TS ;
Lockwood, JW .
IEEE MICRO, 2004, 24 (01) :52-61
[10]   Assisting network intrusion detection with reconfigurable hardware [J].
Hutchings, BL ;
Franklin, R ;
Carver, D .
10TH ANNUAL IEEE SYMPOSIUM ON FIELD-PROGRAMMABLE CUSTOM COMPUTING MACHINES, PROCEEDINGS, 2002, :111-120