Analysing performance issues of open-source intrusion detection systems in high-speed networks

被引:13
|
作者
Hu, Qinwen [1 ]
Yu, Se-Young [2 ]
Asghar, Muhammad Rizwan [1 ]
机构
[1] Univ Auckland, Sch Comp Sci, Auckland, New Zealand
[2] Northwestern Univ, Int Ctr Adv Internet Res, Evanston, IL 60208 USA
关键词
D O I
10.1016/j.jisa.2019.102426
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Driven by the growing data transfer needs, industry and research institutions are deploying 100 Gb/s networks. As such high-speed networks become prevalent, these also introduce significant technical challenges. In particular, an Intrusion Detection System (IDS) cannot process network activities at such a high rate when monitoring large and diverse traffic volumes, thus resulting in packet drops. Unfortunately, the high packet drop rate has a significant impact on detection accuracy. In this work, we investigate two popular open-source IDSs: Snort and Suricata along with their comparative performance benchmarks to better understand drop rates and detection accuracy in 100 Gb/s networks. More specifically, we study vital factors (including system resource usage, packet processing speed, packet drop rate, and detection accuracy) that limit the applicability of IDSs to high-speed networks. Furthermore, we provide a comprehensive analysis to show the performance impact on IDSs by using different configurations, traffic volumes and different flows. Finally, we identify challenges of using open-source IDSs in high-speed networks and provide suggestions to help network administrators to address identified issues and give some recommendations for developing new IDSs that can be used for high-speed networks. (C) 2020 Elsevier Ltd. All rights reserved.
引用
收藏
页数:10
相关论文
共 50 条
  • [1] Application features of commercial and open source intrusion detection systems in the high-speed corporate networks
    Dutkevych, Taras
    Piskozub, Andrian
    TCSET 2006: MODERN PROBLEMS OF RADIO ENGINEERING, TELECOMMUNICATIONS AND COMPUTER SCIENCE, PROCEEDINGS, 2006, : 176 - 177
  • [2] Evaluating Network Intrusion Detection Systems for High-Speed Networks
    Hu, Qinwen
    Asghar, Muhammad Rizwan
    Brownlee, Nevil
    2017 27TH INTERNATIONAL TELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE (ITNAC), 2017, : 402 - 407
  • [3] Hardware Acceleration of Intrusion Detection Systems for High-Speed Networks
    Kucera, Jan
    Kekely, Lukas
    Pus, Viktor
    Piecek, Adam
    Korenek, Jan
    PROCEEDINGS OF THE 2018 SYMPOSIUM ON ARCHITECTURES FOR NETWORKING AND COMMUNICATIONS SYSTEMS (ANCS '18), 2018, : 177 - 178
  • [4] Efficient Intrusion Detection for High-speed Networks
    Ma, Gaolong
    Tang, Wen
    INFORMATION TECHNOLOGY APPLICATIONS IN INDUSTRY, PTS 1-4, 2013, 263-266 : 2915 - 2919
  • [5] Architecture of intrusion detection for high-speed networks
    Chen, Xun-Xun
    Fang, Bin-Xing
    Li, Lei
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2004, 41 (09): : 1481 - 1487
  • [6] Stateful intrusion detection for high-speed networks
    Kruegel, C
    Valeur, F
    Vigna, G
    Kemmerer, R
    2002 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2002, : 285 - 293
  • [7] Intrusion detection and simulation for high-speed networks
    Yu, F
    Dai, XP
    Shen, Y
    Huang, H
    Zhu, ML
    2005 INTERNATIONAL CONFERENCE ON SERVICES SYSTEMS AND SERVICES MANAGEMENT, VOLS 1 AND 2, PROCEEDINGS, 2005, : 835 - 840
  • [8] Network intrusion detection systems in high-speed traffic in computer networks
    Bul'ajoul, Waleed
    James, Anne
    Pannu, Mandeep
    2013 IEEE 10TH INTERNATIONAL CONFERENCE ON E-BUSINESS ENGINEERING (ICEBE), 2013, : 168 - 175
  • [9] CAMNEP: An intrusion detection system for high-speed networks
    Rehák, Martin
    Pěchouček, Michal
    Bartoš, Karel
    Grill, Martin
    Čeleda, Pavel
    Krmíček, Vojtěch
    Progress in Informatics, 2008, (05): : 65 - 74
  • [10] A parallel intrusion detection system for high-speed networks
    Lai, HG
    Cai, SW
    Huang, H
    Xie, JY
    Li, H
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2004, 3089 : 439 - 451