Flexible Software-Hardware Network Intrusion Detection System

Ryan B. Proudfoot, K. Kent, E. Aubanel, Nan Chen
{"title":"Flexible Software-Hardware Network Intrusion Detection System","authors":"Ryan B. Proudfoot, K. Kent, E. Aubanel, Nan Chen","doi":"10.1109/RSP.2008.11","DOIUrl":null,"url":null,"abstract":"Network intrusion detection system (NIDS) demands have been steadily increasing over the past few years. Current solutions using software become inefficient running on high speed high volume networks and will end up dropping packets. Hardware solutions are available and result in much higher efficiency but present problems such as flexibility and cost. Our proposed system uses a modified version of Snort, a robust widely deployed open-sourced NIDS. Snort spends a significant fraction of its processing time doing pattern matching. Our proposed system runs Snort in software until it gets to the pattern matching function and then off loads that processing to the field programmable gate array (FPGA). The hardware is able to process data at up to 1.7 GB/s on one Xilinx XC2VP100 FPGA. Our system is more flexible than other FPGA string matching designs in that the rules are not hard-coded. The design is scalable and allows FPGAs to be used in parallel to increase the processing speed even further.","PeriodicalId":436363,"journal":{"name":"2008 The 19th IEEE/IFIP International Symposium on Rapid System Prototyping","volume":"45 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 The 19th IEEE/IFIP International Symposium on Rapid System Prototyping","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/RSP.2008.11","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4

Abstract

Network intrusion detection system (NIDS) demands have been steadily increasing over the past few years. Current solutions using software become inefficient running on high speed high volume networks and will end up dropping packets. Hardware solutions are available and result in much higher efficiency but present problems such as flexibility and cost. Our proposed system uses a modified version of Snort, a robust widely deployed open-sourced NIDS. Snort spends a significant fraction of its processing time doing pattern matching. Our proposed system runs Snort in software until it gets to the pattern matching function and then off loads that processing to the field programmable gate array (FPGA). The hardware is able to process data at up to 1.7 GB/s on one Xilinx XC2VP100 FPGA. Our system is more flexible than other FPGA string matching designs in that the rules are not hard-coded. The design is scalable and allows FPGAs to be used in parallel to increase the processing speed even further.
灵活的软硬件网络入侵检测系统
近年来,对网络入侵检测系统(NIDS)的需求稳步增长。目前使用软件的解决方案在高速大容量网络上运行效率低下,最终会导致数据包丢失。硬件解决方案是可用的,可以带来更高的效率,但也存在灵活性和成本等问题。我们建议的系统使用Snort的修改版本,这是一种广泛部署的健壮的开源NIDS。Snort将其处理时间的很大一部分用于模式匹配。我们提出的系统在软件中运行Snort,直到它达到模式匹配功能,然后将该处理卸载到现场可编程门阵列(FPGA)。硬件能够在一个Xilinx XC2VP100 FPGA上以高达1.7 GB/s的速度处理数据。我们的系统比其他FPGA字符串匹配设计更灵活,因为规则不是硬编码的。该设计是可扩展的,允许fpga并行使用,以进一步提高处理速度。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信