Evaluating the Effects of Hardware Configurations on Bro under DDoS Attacks

Welcome Luthuli, O. Oki, Paul Tarwireyi, M. Adigun
{"title":"Evaluating the Effects of Hardware Configurations on Bro under DDoS Attacks","authors":"Welcome Luthuli, O. Oki, Paul Tarwireyi, M. Adigun","doi":"10.1109/ICONIC.2018.8601247","DOIUrl":null,"url":null,"abstract":"The exponential growth of network traffic and the growing sophistication of network attacks call for faster, efficient and scalable intrusion detection systems (IDS) that will be able to quickly look into the traffic and timeously produce alerts when malicious traffic has been detected. Snort has been the de-facto standard of IDS for so many years but has been ineffective under heavy loads. In both multi-core and single core hardware configuration snort shows no improvement in detection capability of Transmission Control Protocol (TCP) flooding Distributed Denial of Service (DDoS) attack. This has led to the development of alternative IDS which try to address the limitations of Snort. Bro is a flexible script-driven intrusion detection system, which provides a ‘worker’ based architecture to utilize multiple processors. The aim of this paper is to evaluate Bro in terms of performance and packet handling against TCP flooding DDoS attacks under different hardware configurations. To achieve this aim, Bro was installed on different hardware configurations. Tests were conducted to assess its performance under each configuration. Packet loss, Throughput and resource utilization metrics were measured. The results show that utilizing better hardware increases resources availability hence gives the system better performance.","PeriodicalId":277315,"journal":{"name":"2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICONIC.2018.8601247","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The exponential growth of network traffic and the growing sophistication of network attacks call for faster, efficient and scalable intrusion detection systems (IDS) that will be able to quickly look into the traffic and timeously produce alerts when malicious traffic has been detected. Snort has been the de-facto standard of IDS for so many years but has been ineffective under heavy loads. In both multi-core and single core hardware configuration snort shows no improvement in detection capability of Transmission Control Protocol (TCP) flooding Distributed Denial of Service (DDoS) attack. This has led to the development of alternative IDS which try to address the limitations of Snort. Bro is a flexible script-driven intrusion detection system, which provides a ‘worker’ based architecture to utilize multiple processors. The aim of this paper is to evaluate Bro in terms of performance and packet handling against TCP flooding DDoS attacks under different hardware configurations. To achieve this aim, Bro was installed on different hardware configurations. Tests were conducted to assess its performance under each configuration. Packet loss, Throughput and resource utilization metrics were measured. The results show that utilizing better hardware increases resources availability hence gives the system better performance.
评估DDoS攻击下硬件配置对Bro的影响
网络流量的指数级增长和网络攻击的日益复杂,需要更快、更高效和可扩展的入侵检测系统(IDS),它将能够快速查看流量,并在检测到恶意流量时及时发出警报。Snort多年来一直是IDS的事实上的标准,但是在高负载下一直是无效的。在多核和单核硬件配置中,snort对传输控制协议(TCP)泛滥的分布式拒绝服务(DDoS)攻击的检测能力没有任何改进。这导致了替代IDS的开发,这些IDS试图解决Snort的局限性。Bro是一个灵活的脚本驱动的入侵检测系统,它提供了一个基于“工作者”的架构来利用多个处理器。本文的目的是评估Bro在不同硬件配置下对TCP泛洪DDoS攻击的性能和数据包处理。为了实现这一目标,将Bro安装在不同的硬件配置上。进行了测试,以评估其在每种配置下的性能。测量了丢包、吞吐量和资源利用率指标。结果表明,利用更好的硬件可以提高资源的可用性,从而提高系统的性能。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信