DocumentCode :
2415335
Title :
Design Consideration and Implementation of Portscan Detection Module on NP-Based IDS
Author :
Xu, Xiancheng ; Zhang, Ling ; Dong, Shoubin
Author_Institution :
Commun. & Comput. Network Lab. of Guangdong, South China Univ. of Technol., Guangzhou, China
fYear :
2010
fDate :
7-9 May 2010
Firstpage :
1323
Lastpage :
1326
Abstract :
In this paper we describe the design consideration and implementation of portscan detection module regarding to TCP analyzing of SCUT NIDS. The aim of the portscan module is to take immediate action in response to alerts generated by SCUT NIDS to protect the system from portscan attacks. Portscan module is required to maintain TCP connection records, the design of such a connection table is not trivial for a high speed IDS with large number of active connections and high packet arrival rate,especially in a resource constrains Intel IXP2400 network processor. After comparing various design options, we adapted from hash table data structure, employing the special hardware unit assist to calculate a hash over our unique ascending order quadruple which worked in a quite simple but efficient way that is totally different from the Snort scheme, our design not only differentiates both directions of a TCP connection and thus eliminates unwanted additional search operation, but also avoids data corruption and greatly reduces the probability of hash collisions. In order to improve the allocation/deallocation procedure for TCP connection nodes in our IDS systems, we further devised a large management stack caching with a local memory buffer, which is fully exploiting the specialized network processor architectures and optimizing the use of various types of memories with different speeds and size. The theoretical analysis and experiments confirmed that the combination of a large conventional hash table-based search and an array-based stack with caching improves the performance significantly.
Keywords :
cache storage; computer network security; cryptography; parallel processing; transport protocols; NP based IDS; SCUT NIDS; TCP; array based stack; hash table; network processor architecture; portscan detection module; stack caching; Context; Delay; IP networks; Intrusion detection; Memory management; Random access memory; Resource management; IDS; hash table; nework processor; stack and cache;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
E-Business and E-Government (ICEE), 2010 International Conference on
Conference_Location :
Guangzhou
Print_ISBN :
978-0-7695-3997-3
Type :
conf
DOI :
10.1109/ICEE.2010.338
Filename :
5591627
Link To Document :
بازگشت