skip to main content
10.1145/1921168.1921192acmconferencesArticle/Chapter ViewAbstractPublication PagesconextConference Proceedingsconference-collections
research-article

Network-wide deployment of intrusion detection and prevention systems

Published:30 November 2010Publication History

ABSTRACT

Traditional efforts for scaling network intrusion detection (NIDS) and intrusion prevention systems (NIPS) have largely focused on a single-vantage-point view. In this paper, we explore an alternative design that exploits spatial, network-wide opportunities for distributing NIDS and NIPS functions. For the NIDS case, we design a linear programming formulation to assign detection responsibilities to nodes while ensuring that no node is overloaded. We describe a prototype NIDS implementation adapted from the Bro system to analyze traffic per these assignments, and demonstrate the advantages that this approach achieves. For NIPS, we show how to maximally leverage specialized hardware (e.g., TCAMs) to reduce the footprint of unwanted traffic on the network. Such hardware constraints make the optimization problem NP-hard, and we provide practical approximation algorithms based on randomized rounding.

References

  1. S. Acharya, M. Abliz, B. Mills, T. F. Znati, J. Wang, Z. Ge, and A. Greenberg. OPTWALL: A Traffic-Aware Hierarchical Firewall Optimization. In Proc. NDSS, 2007.Google ScholarGoogle Scholar
  2. D. L. Applegate, G. Calinescu, D. S. Johnson, H. Karloff, K. Ligett, and J. Wang. Compressing Rectilinear Pictures and Minimizing Access Control Lists. In Proc. SODA, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Arbor networks. http://www.arbor.com.Google ScholarGoogle Scholar
  4. AT&T Enterprise Threat Management. http://www.business.att.com/enterprise/Family/business-continuity-enterprise/threat-management-enterprise/.Google ScholarGoogle Scholar
  5. H. Ballani and P. Francis. CONMan: A Step Towards Network Manageability. In Proc. ACM SIGCOMM, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. C. Kruegel, F. Valeur, G. Vigna, and R. A. Kemmerer. Stateful Intrusion Detection for High-Speed Networks. In Proc. IEEE Symposium on Security and Privacy, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. M. Caesar, D. Caldwell, N. Feamster, J. Rexford, A. Shaikh, and J. van der Merwe. Design and implementation of a Routing Control Platform. In Proc. NSDI, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. G. R. Cantieni, G. Iannaccone, C. Barakat, C. Diot, and P. Thiran. Reformulating the Monitor Placement problem: Optimal Network-Wide Sampling. In Proc. CoNeXT, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. N. Duffield and M. Grossglauser. Trajectory Sampling for Direct Traffic Observation. In Proc. ACM SIGCOMM, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. E. W. Fulp. Optimization of network firewalls policies using directed acyclic graphs. In Proc. Internet Management Conference, 2005.Google ScholarGoogle Scholar
  11. F. Cuppens and A. Miege. Alert correlation in a cooperative intrusion detection framework. In Proc. IEEE Symposium on Security and Privacy, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. A. Feldmann, A. G. Greenberg, C. Lund, N. Reingold, J. Rexford, and F. True. Deriving Traffic Demands for Operational IP Networks: Methodology and Experience. In Proc. ACM SIGCOMM, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. L. Foschini, A. V. Thapliyal, L. Cavallaro, C. Kruegel, and G. Vigna. A Parallel Architecture for Stateful, High-Speed Intrusion Detection. In Proc. ICISS, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. A. Greenberg, G. Hjalmtysson, D. A. Maltz, A. Meyers, J. Rexford, G. Xie, H. Yan, J. Zhan, and H. Zhang. A Clean Slate 4D Approach to Network Control and Management. ACM SIGCOMM CCR, 35(5), Oct. 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. H. Dreger, A. Feldmann, V. Paxson, and R. Sommer. Operational Experiences with High-Volume Network Intrusion Detection. In Proc. ACM CCS, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. H. Dreger, A. Feldmann, V. Paxson and R. Sommer. Predicting the Resource Consumption of Network Intrusion Detection Systems. In Proc. RAID, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. J. Gonzalez, V. Paxson, and N. Weaver. Shunting: A Hardware/Software Architecture for Flexible, High-Performance Network Intrusion Prevention. In Proc. ACM CCS, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. A. Kalai and S. Vempala. Efficient Algorithms for Online Decision Problems. Journal of Computer System Sciences, 71(3), Oct. 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. A. Lakhina, M. Crovella, and C. Diot. Mining anomalies using traffic feature distributions. In Proc. ACM SIGCOMM, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. V. T. Lam, M. Mitzenmacher, and G. Varghese. Carousel: Scalable Logging for Intrusion Prevention Systems. In Proc. NSDI, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. A. Le, E. Al-Shaer, and R. Batouba. Correlation-Based Load Balancing for Intrusion Detection and Prevention Systems. In Proc. SECURECOMM, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. X. Li, F. Bian, H. Zhang, C. Diot, R. Govindan, W. Hong, and G. Iannaccone. MIND: A Distributed Multidimensional Indexing for Network Diagnosis. In Proc. IEEE INFOCOM, 2006.Google ScholarGoogle Scholar
  23. K. Ligett, S. Kakade, and A. T. Kalai. Playing Games with Approximation Algorithms. In Proc. STOC, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. M. Kodialam, T. V. Lakshman, and Sudipta Sengupta. Configuring Networks with Content Filtering Nodes with Applications to Network Security. In Proc. INFOCOM, 2005.Google ScholarGoogle ScholarCross RefCross Ref
  25. R. Mahajan, N. Spring, D. Wetherall, and T. Anderson. Inferring Link Weights using End-to-End Measurements. In Proc. IMW, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. M. Molina, S. Niccolini, and N. Duffield. A Comparative Experimental Study of Hash Functions Applied to Packet Sampling. In Proc. International Teletraffic Congress (ITC), 2005.Google ScholarGoogle Scholar
  27. S. Narain, G. Levin, S. Malik, and V. Kaul. Declarative infrastructure configuration synthesis and debugging. Journal of Network and Systems Management, 16(3), 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. V. Paxson. Bro: A System for Detecting Network Intruders in Real-Time. Computer Networks, 31(23--24):2435--2463, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. P. Raghavan and C. D. Thompson. Randomized rounding: A technique for provably good algorithms and algorithmic proofs. Combinatorica, 7(4), Dec. 1987. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. M. Roughan, M. Thorup, and Y. Zhang. Performance of estimated traffic matrices in traffic engineering. In SIGMETRICS, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. V. Sekar, R. Krishnaswamy, A. Gupta, and M. K. Reiter. Network-Wide Deployment of Intrusion Detection and Prevention Systems. Technical Report, CMU-CS-10-124, Comp. Sci. Dept., CMU, 2010.Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. V. Sekar, M. K. Reiter, W. Willinger, H. Zhang, R. Kompella, and D. G. Andersen. cSamp: A System for Network-Wide Flow Monitoring. In Proc. NSDI, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. M. R. Sharma and J. W. Byers. Scalable Coordination Techniques for Distributed Network Monitoring. In Proc. PAM, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. R. Sommer and V. Paxson. Exploiting Independent State for Network Intrusion Detection. In Proc. ACSAC, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. R. Sommer, V. Paxson, and N. Weaver. An Architecture for Exploiting Multi-Core Processors to Parallelize Network Intrusion Prevention. Concurrency and Computation: Practice and Experience, Wiley, 21(10):1255--1279, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. N. Spring, R. Mahajan, and D. Wetherall. Measuring ISP Topologies with Rocketfuel. In Proc. ACM SIGCOMM, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. K. Suh, Y. Guo, J. Kurose, and D. Towsley. Locating Network Monitors: Complexity, heuristics and coverage. In Proc. IEEE INFOCOM, 2005.Google ScholarGoogle Scholar
  38. M. Vallentin, R. Sommer, J. Lee, C. Leres, V. Paxson, and B. Tierney. The NIDS Cluster: Scalable, Stateful Network Intrusion Detection on Commodity Hardware. In Proc. RAID, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. F. Yu, R. H. Katz, and T. V. Lakshman. Gigabit Rate Packet Pattern-Matching Using TCAM. In Proc. ICNP, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. F. Yu, T. V. Lakshman, M. A. Motoyama, and R. H. Katz. SSA: A Power and Memory Efficient Scheme to Multi-Match Packet Classification. In Proc. ANCS, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. Y. Zhang, N. Duffield, V. Paxson, and S. Shenker. On the Constancy of Internet Path Properties. In Proc. IMW, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. Y. Zhang, M. Roughan, N. Duffield, and A. Greenberg. Fast Accurate Computation of Large-scale IP Traffic Matrices from Link Loads. In Proc. ACM SIGMETRICS, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Network-wide deployment of intrusion detection and prevention systems

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        Co-NEXT '10: Proceedings of the 6th International COnference
        November 2010
        349 pages
        ISBN:9781450304481
        DOI:10.1145/1921168

        Copyright © 2010 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 30 November 2010

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        Overall Acceptance Rate198of789submissions,25%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader