Performance analysis of content matching intrusion detection systems

被引:0
|
作者
Antonatos, S [1 ]
Anagnostakis, KG [1 ]
Markatos, EP [1 ]
Polychronakis, M [1 ]
机构
[1] Fdn Res & Technol Hellas, Inst Comp Sci, GR-71110 Iraklion, Greece
关键词
security; intrusion detection; workload characterization and generation;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Although Network Intrusion Detection Systems (nIDS) are widely used, there is limited understanding of how these systems perform in different settings and how they should be evaluated. This paper examines how nIDS performance is affected by traffic characteristics, rulesets, string matching algorithms and processor architecture. The analysis presented in this paper shows that nIDS performance is very sensitive to these factors. Evaluating a nIDS therefore requires careful consideration of a fairly extensive set of scenarios. Our results also highlight potential dangers with the use of workloads based on combining widely-available packet header traces with synthetic packet content as well as with the use of synthetic rulesets.
引用
收藏
页码:208 / 215
页数:8
相关论文
共 50 条
  • [1] ANALYSIS OF PATTERN MATCHING ALGORITHMS IN NETWORK INTRUSION DETECTION SYSTEMS
    Dagar, Vishwajeet
    Prakash, Vatsal
    Bhatia, Tarunpreet
    [J]. 2016 2ND INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATION, & AUTOMATION (ICACCA) (FALL), 2016, : 169 - 173
  • [2] Distributed data parallel techniques for content-matching intrusion detection systems
    Kopek, Christopher V.
    Fulp, Errin W.
    Wheeler, Patrick S.
    [J]. 2007 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1-8, 2007, : 2959 - +
  • [3] An improved technology for content matching intrusion detection system
    Wang, Yang
    Kobayashi, Hidetsune
    [J]. SOFTCOM 2006: INTERNATIONAL CONFERENCE ON SOFTWARE, TELECOMMUNICATIONS AND COMPUTER NETWORKS, 2006, : 238 - +
  • [4] Performance Analysis of Intrusion Detection Systems in the Cloud Computing
    Abdelaziz, Ettaoufik
    Mohamed, Ouzzif
    [J]. PROCEEDINGS OF 2017 3RD INTERNATIONAL CONFERENCE OF CLOUD COMPUTING TECHNOLOGIES AND APPLICATIONS (CLOUDTECH), 2017, : 136 - 143
  • [5] Intrusion detection systems - Introduction to intrusion detection and analysis
    Debar, H
    [J]. SECURITY AND PRIVACY IN ADVANCED NETWORKING TECHNOLOGIES, 2004, 193 : 161 - 177
  • [6] Performance Analysis of Intrusion Detection Systems in Cloud-Based Systems
    Cherkaoui, Rachid
    Zbakh, Mostapha
    Braeken, An
    Touhafi, Abdellah
    [J]. UBIQUITOUS NETWORKING, UNET 2017, 2017, 10542 : 206 - 213
  • [7] A novel hierarchical matching algorithm for intrusion detection systems
    Sheu, TF
    Huang, NF
    Lee, HP
    [J]. GLOBECOM '05: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-6: DISCOVERY PAST AND FUTURE, 2005, : 1691 - 1695
  • [8] An Efficient Pattern Matching Algorithm for Intrusion Detection Systems
    Anithakumari, S.
    Chithraprasad, D.
    [J]. 2009 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE, VOLS 1-3, 2009, : 223 - +
  • [9] Efficient Pattern Matching Algorithm for Intrusion Detection Systems
    Yang, Wenjun
    [J]. SENSORS, MECHATRONICS AND AUTOMATION, 2014, 511-512 : 1178 - 1184
  • [10] Performance Analysis of Anomaly Based Network Intrusion Detection Systems
    Abedin, Md. Zainal
    Siddiquee, Kazy Noor-e-Alam
    Bhuyan, M. S.
    Karim, Razuan
    Hossain, Mohammad Shahadat
    Andersson, Karl
    [J]. PROCEEDINGS OF THE 2018 43RD ANNUAL IEEE CONFERENCE ON LOCAL COMPUTER NETWORKS WORKSHOPS (LCN WORKSHOPS), 2018, : 1 - 7