• DocumentCode
    3359545
  • Title

    Conservative vs. Optimistic Parallelization of Stateful Network Intrusion Detection

  • Author

    Schuff, Derek L. ; Choe, Yung ; Pai, Vijay S.

  • Author_Institution
    Purdue Univ. West Lafayette, West Lafayette, IN
  • fYear
    2008
  • fDate
    20-22 April 2008
  • Firstpage
    32
  • Lastpage
    43
  • Abstract
    This paper presents and experimentally analyzes the performance of three parallelization strategies for the popular open-source Snort network intrusion detection system (NIDS). The parallelizations include 2 conservative variants and 1 optimistic scheme. The conservative strategy parallelizes inspection at the level of TCP/IP flows, as any potential inter-packet dependences are confined to a single flow. The flows are partitioned among threads, and each flow is processed in-order at one thread. A second variation reassigns flows between threads to improve load balance but still requires that only one thread process a given flow at a time. The flow-concurrent scheme provides good performance for 3 of the 5 network packet traces studied, reaching as high as 4.1 speedup and 3.1 Gbps inspection rate on a commodity 8-core server. Dynamic reassignment does not improve performance scalability because it introduces locking overheads that offset any potential benefits of load balancing. Neither conservative version can achieve good performance, however, without enough concurrent networkflows. For this case, this paper presents an optimistic parallelization that exploits the observation that not all packets from a flow are actually connected by dependences. This system allows a single flow to be simultaneously processed by multiple threads, stalling if an actual dependence is found. The optimistic version has additional overheads that reduce speedup by 25% for traces with flow concurrency, but its benefits allow one additional trace to see substantial speedup (2.4 on five cores).
  • Keywords
    computer networks; concurrency control; public domain software; resource allocation; security of data; telecommunication security; transport protocols; TCP-IP flow; conservative parallelization; flow concurrency; flow concurrent scheme; flow partitioning; flow reassignment; inspection parallelization; interpacket dependence; load balancing; network packet; open-source Snort network intrusion detection system; optimistic parallelization; stateful network intrusion; Concurrent computing; Inspection; Intrusion detection; Load management; Network servers; Open source software; Performance analysis; Scalability; TCPIP; Yarn;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Performance Analysis of Systems and software, 2008. ISPASS 2008. IEEE International Symposium on
  • Conference_Location
    Austin, TX
  • Print_ISBN
    978-1-4244-2232-6
  • Electronic_ISBN
    978-1-4244-2233-3
  • Type

    conf

  • DOI
    10.1109/ISPASS.2008.4510736
  • Filename
    4510736