NetShield: Matching with a Large Vulnerability Signature Ruleset for High Performance Network Defense
نویسندگان
چکیده
Accuracy and speed are the two most im-portant metrics for Network Intrusion Detection or Pre-vention Systems (NIDS/NIPSes). Due to emerging poly-morphic attacks and the fact that in many cases regu-lar expressions (regexes) cannot capture the vulnerabil-ity conditions accurately, the accuracy of existing regex-based NIDS/NIPS systems has become a serious prob-lem. In contrast, the recently-proposed vulnerability sig-natures [8, 29] (a.k.a. data patches) can exactly describethe vulnerability conditions and achieve better accuracy.However, when applying vulnerability signatures to highspeed NIDS/NIPS with a large ruleset, how to efficientlymatch them is an untouched but challenging issue. This paper presents the design of NetShield, a vulner-ability signature based NIDS/NIPS which achieves multi-gigabit throughput while offering much better accuracy.This is accomplished because of the following contribu-tions: (i) we propose a candidate selection (CS) algo-rithm which efficiently matches thousands of vulnerabil-ity signatures simultaneously requiring a small amount ofmemory; (ii) we propose a automatic lightweight pars-ing transition state machine achieving fast protocol pars-ing; (iii) we implement the NetShield prototype. Exper-imental results show that the core engine of NetShieldachieves at least 1.9+Gbps signature matching throughputon a 3.8GHz single-core PC, and can scale-up to at least11+Gbps under a 8-core CPU for 794 HTTP vulnerabilitysignatures.
منابع مشابه
Improvement and parallelization of Snort network intrusion detection mechanism using graphics processing unit
Nowadays, Network Intrusion Detection Systems (NIDS) are widely used to provide full security on computer networks. IDS are categorized into two primary types, including signature-based systems and anomaly-based systems. The former is more commonly used than the latter due to its lower error rate. The core of a signature-based IDS is the pattern matching. This process is inherently a computatio...
متن کاملAn Ant Colony Optimization Algorithm for Network Vulnerability Analysis
Intruders often combine exploits against multiple vulnerabilities in order to break into the system. Each attack scenario is a sequence of exploits launched by an intruder that leads to an undesirable state such as access to a database, service disruption, etc. The collection of possible attack scenarios in a computer network can be represented by a directed graph, called network attack gra...
متن کاملNetShield: Protocol Anomaly Detection with Datamining Against DDoS Attacks
This article presents a new defense system to protect network servers, network routers, and client hosts from becoming the handlers, Zombies, and victims of distributed denial-of-service (DDoS) flood attacks. The NetShield system was developed at USC to protect any IP-based public network over the Internet. We explore preventive and deterrent controls to remove system vulnerabilities on target ...
متن کاملProactive Intrusion Defense Against DDoS Flooding Attacks: Adaptive Filtering with Security Datamining – The NetShield Approach at USC*
The NetShield security system was developed at USC to defend against network worms and flood attacks. The system prevents malicious hackers from orchestrating DDoS flooding attacks on any IP-based public network. This article presents new packet filtering and anomaly detection techniques developed with the NetShield system. All packets from each IP source are counted and timed during their life...
متن کاملTrust Models and NetShield Architecture for Securing Grid Computing*
Highly shared resources over multiple grid platforms make insecurity and privacy abuse major obstacles hindering general-purpose Grid applications. A scalable grid system demands the allocation and release of resources dynamically. A distributed Grid security (GridSec) architecture is introduced to meet these demands. The architecture is built with distributed firewalls, packet filters, securit...
متن کامل