Title :
Conservative vs. Optimistic Parallelization of Stateful Network Intrusion Detection
Author :
Schuff, Derek L. ; Choe, Yung ; Pai, Vijay S.
Author_Institution :
Purdue Univ. West Lafayette, West Lafayette, IN
Abstract :
This paper presents and experimentally analyzes the performance of three parallelization strategies for the popular open-source Snort network intrusion detection system (NIDS). The parallelizations include 2 conservative variants and 1 optimistic scheme. The conservative strategy parallelizes inspection at the level of TCP/IP flows, as any potential inter-packet dependences are confined to a single flow. The flows are partitioned among threads, and each flow is processed in-order at one thread. A second variation reassigns flows between threads to improve load balance but still requires that only one thread process a given flow at a time. The flow-concurrent scheme provides good performance for 3 of the 5 network packet traces studied, reaching as high as 4.1 speedup and 3.1 Gbps inspection rate on a commodity 8-core server. Dynamic reassignment does not improve performance scalability because it introduces locking overheads that offset any potential benefits of load balancing. Neither conservative version can achieve good performance, however, without enough concurrent networkflows. For this case, this paper presents an optimistic parallelization that exploits the observation that not all packets from a flow are actually connected by dependences. This system allows a single flow to be simultaneously processed by multiple threads, stalling if an actual dependence is found. The optimistic version has additional overheads that reduce speedup by 25% for traces with flow concurrency, but its benefits allow one additional trace to see substantial speedup (2.4 on five cores).
Keywords :
computer networks; concurrency control; public domain software; resource allocation; security of data; telecommunication security; transport protocols; TCP-IP flow; conservative parallelization; flow concurrency; flow concurrent scheme; flow partitioning; flow reassignment; inspection parallelization; interpacket dependence; load balancing; network packet; open-source Snort network intrusion detection system; optimistic parallelization; stateful network intrusion; Concurrent computing; Inspection; Intrusion detection; Load management; Network servers; Open source software; Performance analysis; Scalability; TCPIP; Yarn;
Conference_Titel :
Performance Analysis of Systems and software, 2008. ISPASS 2008. IEEE International Symposium on
Conference_Location :
Austin, TX
Print_ISBN :
978-1-4244-2232-6
Electronic_ISBN :
978-1-4244-2233-3
DOI :
10.1109/ISPASS.2008.4510736