On High-Speed Flow-Based Intrusion Detection Using Snort-Compatible Signatures

被引:22
|
作者
Erlacher, Felix [1 ,2 ]
Dressler, Falko [1 ,2 ]
机构
[1] Paderborn Univ, Heinz Nixdorf Inst, D-33098 Paderborn, Germany
[2] Paderborn Univ, Dept Comp Sci, D-33098 Paderborn, Germany
关键词
Intrusion detection; Pattern matching; Internet; Payloads; Protocols; Hardware; Throughput; Network security; intrusion detection; flow monitoring; high-speed networks; NETFLOW; SYSTEMS;
D O I
10.1109/TDSC.2020.2973992
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Signature-based Network Intrusion Detection Systems (NIDS) have become state-of-the-art in modern network security solutions. However, most systems are not designed for modern high-speed network links. In the field of network monitoring, an alternative solution has become the choice for such high-speed networks. Flow-monitoring, typically based on the Internet Protocol Flow Information Export (IPFIX) standard, now goes well beyond collecting statistical information about network connections. Current solutions are even able to include selected parts of the payload in these Flows to be used in conjunction with NIDS. Recently, we extended this concept to application layer HTTP Flows. We now present our improved version of the IPFIX-based Signature-based Intrusion Detection System (FIXIDS). Fixids makes use of HTTP intrusion detection signatures from the popular Snort system and applies them to incoming IPFIX-conforming HTTP Flows. Our evaluation shows that Fixids can deal with four times higher network data rates without drops compared to Snort, while maintaining the same event detection rate. Furthermore, a substantial part of the data traffic can be outsourced to Fixids so that Snort can be relieved of a significant portion of rules and traffic. This increases both the detection rate and the data rate the overall security appliance can handle.
引用
收藏
页码:495 / 506
页数:12
相关论文
共 50 条
  • [1] A Flow-Based Network Intrusion Detection System for High-Speed Networks Using Meta-heuristic Scale
    Jyothsna, V.
    Mukesh, D.
    Sreedhar, A. N.
    [J]. COMPUTING AND NETWORK SUSTAINABILITY, 2019, 75
  • [2] High-speed flow-based classification on FPGA
    Groleat, Tristan
    Vaton, Sandrine
    Arzel, Matthieu
    [J]. INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT, 2014, 24 (04) : 253 - 271
  • [3] FIXIDS: A High-Speed Signature-based Flow Intrusion Detection System
    Erlacher, Felix
    Dressler, Falko
    [J]. NOMS 2018 - 2018 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, 2018,
  • [4] Intrusion Detection Using Flow-Based Analysis of Network Traffic
    David, Jisa
    Thomas, Ciza
    [J]. ADVANCES IN NETWORKS AND COMMUNICATIONS, PT II, 2011, 132 : 391 - 399
  • [5] A High-Speed Traffic Manager Architecture for Flow-Based Networking
    Benacer, Imad
    Boyer, Francois-Raymond
    Savaria, Yvon
    [J]. 2017 IEEE 15TH INTERNATIONAL NEW CIRCUITS AND SYSTEMS CONFERENCE (NEWCAS), 2017, : 161 - 164
  • [6] ACCURATE AND FLEXIBLE FLOW-BASED MONITORING FOR HIGH-SPEED NETWORKS
    Forconesi, Marco
    Sutter, Gustavo
    Lopez-Buedo, Sergio
    Aracil, Javier
    [J]. 2013 23RD INTERNATIONAL CONFERENCE ON FIELD PROGRAMMABLE LOGIC AND APPLICATIONS (FPL 2013) PROCEEDINGS, 2013,
  • [7] Flow-based anomaly detection in high-speed links using modified GSA-optimized neural network
    Mansour Sheikhan
    Zahra Jadidi
    [J]. Neural Computing and Applications, 2014, 24 : 599 - 611
  • [8] Flow-based anomaly detection in high-speed links using modified GSA-optimized neural network
    Sheikhan, Mansour
    Jadidi, Zahra
    [J]. NEURAL COMPUTING & APPLICATIONS, 2014, 24 (3-4): : 599 - 611
  • [9] Flow-Based Intrusion Detection Systems: A Survey
    Al-Bakaa, Aliaa
    Al-Musawi, Bahaa
    [J]. APPLICATIONS AND TECHNIQUES IN INFORMATION SECURITY (ATIS 2021), 2022, 1554 : 121 - 137
  • [10] Flow-based intrusion detection: Techniques and challenges
    Umer, Muhammad Fahad
    Sher, Muhammad
    Bi, Yaxin
    [J]. COMPUTERS & SECURITY, 2017, 70 : 238 - 254