Hide metadata

dc.date.accessioned2022-03-15T16:38:11Z
dc.date.available2022-03-15T16:38:11Z
dc.date.created2021-07-22T12:05:12Z
dc.date.issued2021
dc.identifier.citationHaugerud, Hårek Tran, Huy Nhut Aitsaadi, Nadjib Yazidi, Anis . A dynamic and scalable parallel Network Intrusion Detection System using intelligent rule ordering and Network Function Virtualization. Future generations computer systems. 2021, 124, 254-267
dc.identifier.urihttp://hdl.handle.net/10852/92511
dc.description.abstractA Network Intrusion Detection System (NIDS) is a fundamental security tool. However, under heavy network traffic, a NIDS might become a bottleneck. In an overloaded state, incoming and outgoing packets in the network might suffer from long delays since previous packets are still being inspected, and eventually the NIDS starts to drop packets when it runs out of hardware resources. Although many solutions have been suggested in the literature to counter this problem, they are not completely reliable as each of them has limitations. This paper investigates the design of a lightweight elastic architecture which allows parallel processing in an existing NIDS while maintaining the filtering integrity. Furthermore, we propose two adaptive algorithms which dynamically adjust and divide the signature rules evenly across NIDS nodes using a node level parallelism method in order to achieve intelligent rule ordering. We test our approaches in real-life settings by implementing a functioning prototype involving different modern networking technologies. The prototype presented is a Network Function Virtualization (NFV) of an intrusion detection system which utilizes Open vSwitch and Docker containers running Snort in order to provide an elastic system. To the best of our knowledge, there has been no work that orchestrates both scaling and rule splitting and re-ordering of IDS signatures as a part of a holistic elastic IDS solution. The results of this study show that the proposed algorithms are able to equally split the IDS workload and thereby enabling the system to scale by adjusting the number of virtual components which analyse the network traffic. At the same time the experiments indicate that the algorithms can be tuned by a single parameter in order to avoid that some packets go unexamined while simultaneously craving a minimum of the dynamically available computer resources.
dc.languageEN
dc.rightsAttribution 4.0 International
dc.rights.urihttps://creativecommons.org/licenses/by/4.0/
dc.titleA dynamic and scalable parallel Network Intrusion Detection System using intelligent rule ordering and Network Function Virtualization
dc.typeJournal article
dc.creator.authorHaugerud, Hårek
dc.creator.authorTran, Huy Nhut
dc.creator.authorAitsaadi, Nadjib
dc.creator.authorYazidi, Anis
cristin.unitcode185,15,5,0
cristin.unitnameInstitutt for informatikk
cristin.ispublishedtrue
cristin.fulltextpostprint
cristin.fulltextpostprint
cristin.qualitycode2
dc.identifier.cristin1922412
dc.identifier.bibliographiccitationinfo:ofi/fmt:kev:mtx:ctx&ctx_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.jtitle=Future generations computer systems&rft.volume=124&rft.spage=254&rft.date=2021
dc.identifier.jtitleFuture generations computer systems
dc.identifier.volume124
dc.identifier.startpage254
dc.identifier.endpage267
dc.identifier.doihttps://doi.org/10.1016/j.future.2021.05.037
dc.identifier.urnURN:NBN:no-95097
dc.type.documentTidsskriftartikkel
dc.type.peerreviewedPeer reviewed
dc.source.issn0167-739X
dc.identifier.fulltextFulltext https://www.duo.uio.no/bitstream/handle/10852/92511/6/1-s2.0-S0167739X21001874-main.pdf
dc.type.versionPublishedVersion


Files in this item

Appears in the following Collection

Hide metadata

Attribution 4.0 International
This item's license is: Attribution 4.0 International