Skip to main content

2016 | OriginalPaper | Buchkapitel

Gigabit Network Intrusion Detection System Using Extended Bloom Filter in Reconfigurable Hardware

verfasst von : Akshay Eldho Jose, T. Gireeshkumar

Erschienen in: Proceedings of the Second International Conference on Computer and Communication Technologies

Verlag: Springer India

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Network intrusion detection system collects information from network and identifies all the possible existing network security threats. Software based detection systems are common but are not good enough for the current network security requirements. Present day network intrusion detection needs wire-level data transfer to avoid the inefficiency in pattern matching process. Hardware based solutions like field programmable gate array which is known for its high processing capability can easily solve these issues. This paper implements a hardware based gigabit intrusion detection system using extended Bloom filter concepts. The paper presents a solution to reduce the high error rate of Bloom Filter by introducing a Reference Vector to the work and evaluates its performance. The reference vector verifies the Bloom filter output for any possible false positive results and reduces the error rate in the system.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Roesch, Martin, et al.: Snort: lightweight intrusion detection for networks. LISA 99, 229–238 (1999) Roesch, Martin, et al.: Snort: lightweight intrusion detection for networks. LISA 99, 229–238 (1999)
2.
Zurück zum Zitat Cohen, S., Matias, Y.: Spectral bloom filters. In: Proceedings of the 2003 ACM SIGMOD international conference on Management of data, pp. 241–252. ACM (2003) Cohen, S., Matias, Y.: Spectral bloom filters. In: Proceedings of the 2003 ACM SIGMOD international conference on Management of data, pp. 241–252. ACM (2003)
3.
Zurück zum Zitat Bloom, B.H.: Space/time trade-offs in hash coding with allowable errors. Commun. ACM 13(7), 422–426 (1970)MATHCrossRef Bloom, B.H.: Space/time trade-offs in hash coding with allowable errors. Commun. ACM 13(7), 422–426 (1970)MATHCrossRef
4.
Zurück zum Zitat Fan, L., Cao, P., Almeida, J., Broder, A.Z.: Summary cache: a scalable wide-area web cache sharing protocol. In: IEEE/ACM Transactions on Networking (TON) 8(3):281–293 (2000) Fan, L., Cao, P., Almeida, J., Broder, A.Z.: Summary cache: a scalable wide-area web cache sharing protocol. In: IEEE/ACM Transactions on Networking (TON) 8(3):281–293 (2000)
5.
Zurück zum Zitat Sidhu, R., Prasanna, V.K.: Fast regular expression matching using FPGAs. In: The 9th Annual IEEE Symposium on Field-Programmable Custom Computing Machines, FCCM’01, pp. 227–238. IEEE (2001) Sidhu, R., Prasanna, V.K.: Fast regular expression matching using FPGAs. In: The 9th Annual IEEE Symposium on Field-Programmable Custom Computing Machines, FCCM’01, pp. 227–238. IEEE (2001)
6.
Zurück zum Zitat Hutchings, B.L., Franklin, R., Carver, D.: Assisting network intrusion detection with reconfigurable hardware. In: Proceedings 10th Annual IEEE Symposium on Field-Programmable Custom Computing Machines. pp. 111–120. IEEE (2002) Hutchings, B.L., Franklin, R., Carver, D.: Assisting network intrusion detection with reconfigurable hardware. In: Proceedings 10th Annual IEEE Symposium on Field-Programmable Custom Computing Machines. pp. 111–120. IEEE (2002)
8.
Zurück zum Zitat Dharmapurikar, S., Krishnamurthy, P., Sproull, T., Lockwood, J.: Deep packet inspection using parallel bloom filters. In: Proceedings of 11th Symposium on High Performance Interconnects. pp. 44–51. IEEE (2003) Dharmapurikar, S., Krishnamurthy, P., Sproull, T., Lockwood, J.: Deep packet inspection using parallel bloom filters. In: Proceedings of 11th Symposium on High Performance Interconnects. pp. 44–51. IEEE (2003)
9.
Zurück zum Zitat Dharmapurikar, S., Attig, M., Lockwood, J.: Design and implementation of a string matching system for network intrusion detection using FPGA-based bloom filters. In: IEEE Symposium on Field-Programmable Custom Computing Machines (FCCM04) (2004) Dharmapurikar, S., Attig, M., Lockwood, J.: Design and implementation of a string matching system for network intrusion detection using FPGA-based bloom filters. In: IEEE Symposium on Field-Programmable Custom Computing Machines (FCCM04) (2004)
10.
Zurück zum Zitat Ramakrishna, M., Fu, E., Bahcekapili, E.: A performance study of hashing functions for hardware applications. In: Proceedings of International Conference on Computing and Information, pp. 1621–1636 (1994) Ramakrishna, M., Fu, E., Bahcekapili, E.: A performance study of hashing functions for hardware applications. In: Proceedings of International Conference on Computing and Information, pp. 1621–1636 (1994)
11.
Zurück zum Zitat Song, H., Lockwood, J.W.: Efficient packet classification for network intrusion detection using FPGA. In: Proceedings of the 2005 ACM/SIGDA 13th international symposium on Field-programmable gate arrays, pp. 238–245. ACM (2005) Song, H., Lockwood, J.W.: Efficient packet classification for network intrusion detection using FPGA. In: Proceedings of the 2005 ACM/SIGDA 13th international symposium on Field-programmable gate arrays, pp. 238–245. ACM (2005)
12.
Zurück zum Zitat Pontarelli, S., Bianchi, G., Teofili, S.: Traffic-aware design of a high-speed FPGA network intrusion detection system. Trans. Comput. IEEE 62(11), 2322–2334 (2013)MathSciNetCrossRef Pontarelli, S., Bianchi, G., Teofili, S.: Traffic-aware design of a high-speed FPGA network intrusion detection system. Trans. Comput. IEEE 62(11), 2322–2334 (2013)MathSciNetCrossRef
13.
Zurück zum Zitat Baker, Z.K., Prasanna, V.K.: Automatic synthesis of efficient intrusion detection systems on FPGAs. In: Field Programmable Logic and Application, pp. 311–321. Springer, Berlin (2004) Baker, Z.K., Prasanna, V.K.: Automatic synthesis of efficient intrusion detection systems on FPGAs. In: Field Programmable Logic and Application, pp. 311–321. Springer, Berlin (2004)
14.
Zurück zum Zitat Hua, N., Norige, E., Kumar, S., Lynch, B.: Non-crypto hardware hash functions for high performance networking ASICs. In: Proceedings of the 2011 ACM/IEEE Seventh Symposium on Architectures for Networking and Communications Systems, pp. 156–166. IEEE Computer Society (2011) Hua, N., Norige, E., Kumar, S., Lynch, B.: Non-crypto hardware hash functions for high performance networking ASICs. In: Proceedings of the 2011 ACM/IEEE Seventh Symposium on Architectures for Networking and Communications Systems, pp. 156–166. IEEE Computer Society (2011)
15.
Zurück zum Zitat Xilinx Inc. Virtex-II Pro and Virtex-II Pro X platform FPGAs: Complete data sheet (2004) Xilinx Inc. Virtex-II Pro and Virtex-II Pro X platform FPGAs: Complete data sheet (2004)
Metadaten
Titel
Gigabit Network Intrusion Detection System Using Extended Bloom Filter in Reconfigurable Hardware
verfasst von
Akshay Eldho Jose
T. Gireeshkumar
Copyright-Jahr
2016
Verlag
Springer India
DOI
https://doi.org/10.1007/978-81-322-2517-1_2

Neuer Inhalt