Abstract
Security of today's networks heavily rely on network intrusion detection systems (NIDSs). The ability to promptly update the supported rule sets and detect new emerging attacks makes field-programmable gate arrays (FPGAs) a very appealing technology. An important issue is how to scale FPGA-based NIDS implementations to ever faster network links. Whereas a trivial approach is to balance traffic over multiple, but functionally equivalent, hardware blocks, each implementing the whole rule set (several thousands rules), the obvious cons is the linear increase in the resource occupation. In this work, we promote a different, traffic-aware, modular approach in the design of FPGA-based NIDS. Instead of purely splitting traffic across equivalent modules, we classify and group homogeneous traffic, and dispatch it to differently capable hardware blocks, each supporting a (smaller) rule set tailored to the specific traffic category. We implement and validate our approach using the rule set of the well-known Snort NIDS, and we experimentally investigate the emerging trade-offs and advantages, showing resource savings up to 80 percent based on real-world traffic statistics gathered from an operator's backbone.
Original language | English |
---|---|
Article number | 6205739 |
Pages (from-to) | 2322-2334 |
Number of pages | 13 |
Journal | IEEE Transactions on Computers |
Volume | 62 |
Issue number | 11 |
DOIs | |
Publication status | Published - 7 Oct 2013 |
Keywords
- Deep packet inspection
- Fpga
- Intrusion detection system
- Snort
- String matching
- Traffic awareness