• DocumentCode
    1345211
  • Title

    Improving snort performance under linux

  • Author

    Salah, Khaled ; Kahtani, A.

  • Author_Institution
    Dept. of Inf. & Comput. Sci., King Fahd Univ. of Pet. & Miner., Dhahran, Saudi Arabia
  • Volume
    3
  • Issue
    12
  • fYear
    2009
  • fDate
    12/1/2009 12:00:00 AM
  • Firstpage
    1883
  • Lastpage
    1895
  • Abstract
    Network intrusion detection systems (NIDS) have become vital components in securing today´s computer networks. To be highly effective, NIDS must perform packet inspection of incoming traffic at or near wire speed. Failing to do so will allow malicious packets to sneak through the network undetected, and thus jeopardising network security. Snort is one of the most popular IDS and intrusion prevention system (IPS) applications. Snort is a publicly available open-source NIDS application that typically runs on Linux. In this study, the authors present and discuss the essential software components of Snort and its underlying Linux support architecture. The authors characterise Snort execution and present an analytical queuing model to give insight into understanding the kernel and Snort behaviour as well as to identify key-dominating factors that strongly influence and impact Snort performance. The authors demonstrate that the current default configurations of the packet reception mechanism of the Linux networking subsystem (a.k.a. NAPI) are not suitable for Snort performance and show that the performance of Snort can be improved significantly by tuning certain configuration parameters, specifically by having a small NAPI budge value of 2. The performance is measured in terms of throughput and packet loss. The authors also measure the packet loss encountered at the kernel level as well as the interrupt rate of incoming traffic. Performance was measured when subjecting a PC host running Snort to both normal and malicious traffic, and with different traffic load conditions.
  • Keywords
    Linux; computer networks; queueing theory; reception; telecommunication security; telecommunication traffic; Linux; NIDS; Snort performance; analytical queuing model; computer network; intrusion prevention system; malicious packets; network intrusion detection system; network security; network throughput; network traffic; networking subsystem; packet inspection; packet loss; packet reception;
  • fLanguage
    English
  • Journal_Title
    Communications, IET
  • Publisher
    iet
  • ISSN
    1751-8628
  • Type

    jour

  • DOI
    10.1049/iet-com.2009.0114
  • Filename
    5343506