Analysing performance issues of open-source intrusion detection systems in high-speed networks

被引:16
作者
Hu, Qinwen [1 ]
Yu, Se-Young [2 ]
Asghar, Muhammad Rizwan [1 ]
机构
[1] Univ Auckland, Sch Comp Sci, Auckland, New Zealand
[2] Northwestern Univ, Int Ctr Adv Internet Res, Evanston, IL 60208 USA
关键词
D O I
10.1016/j.jisa.2019.102426
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Driven by the growing data transfer needs, industry and research institutions are deploying 100 Gb/s networks. As such high-speed networks become prevalent, these also introduce significant technical challenges. In particular, an Intrusion Detection System (IDS) cannot process network activities at such a high rate when monitoring large and diverse traffic volumes, thus resulting in packet drops. Unfortunately, the high packet drop rate has a significant impact on detection accuracy. In this work, we investigate two popular open-source IDSs: Snort and Suricata along with their comparative performance benchmarks to better understand drop rates and detection accuracy in 100 Gb/s networks. More specifically, we study vital factors (including system resource usage, packet processing speed, packet drop rate, and detection accuracy) that limit the applicability of IDSs to high-speed networks. Furthermore, we provide a comprehensive analysis to show the performance impact on IDSs by using different configurations, traffic volumes and different flows. Finally, we identify challenges of using open-source IDSs in high-speed networks and provide suggestions to help network administrators to address identified issues and give some recommendations for developing new IDSs that can be used for high-speed networks. (C) 2020 Elsevier Ltd. All rights reserved.
引用
收藏
页数:10
相关论文
共 27 条
  • [1] EFFICIENT STRING MATCHING - AID TO BIBLIOGRAPHIC SEARCH
    AHO, AV
    CORASICK, MJ
    [J]. COMMUNICATIONS OF THE ACM, 1975, 18 (06) : 333 - 340
  • [2] Alhomoud A., 2011, Procedia Computer Science, V5, P173, DOI [10.1016/j.procs.2011.07.024, DOI 10.1016/J.PROCS.2011.07.024]
  • [3] Antonatos S., 2004, Software Engineering Notes, V29, P207, DOI 10.1145/974043.974078
  • [4] Becchi M., 2009, PROC ANCS, P30
  • [5] Bezborodov S., 2016, INTRUSION DETECTION
  • [6] Campbell S, 2011, STATE PRACTICE REPOR, P14
  • [7] Clark CR, 2003, LECT NOTES COMPUT SC, V2778, P956
  • [8] Day DJ, 2011, INT CONF DIGIT SOC, P187
  • [9] Gong YY, 2014, IEEE INT CONF HIGH, P90, DOI 10.1109/HPSR.2014.6900887
  • [10] The eXpress Data Path: Fast Programmable Packet Processing in the Operating System Kernel
    Hoiland-Jorgensen, Toke
    Brouer, Jesper Dangaard
    Borkmann, Daniel
    Fastabend, John
    Herbert, Tom
    Ahern, David
    Miller, David
    [J]. CONEXT'18: PROCEEDINGS OF THE 14TH INTERNATIONAL CONFERENCE ON EMERGING NETWORKING EXPERIMENTS AND TECHNOLOGIES, 2018, : 54 - 66