DocumentCode :
434559
Title :
On the statistical distribution of processing times in network intrusion detection
Author :
Cabrera, João B D ; Gosar, Jaykumar ; Lee, Wenke ; Mehra, Raman K.
Author_Institution :
Sci. Syst. Co. Inc., Woburn, MA, USA
Volume :
1
fYear :
2004
fDate :
14-17 Dec. 2004
Firstpage :
75
Abstract :
Intrusion detection systems (IDSs) are relatively complex devices that monitor information systems in search for security violations. Characterizing the service times of network IDSs is a crucial step in improving their real time performance. We analyzed about 41 million packets organized in five data sets of 10 minutes each collected at the entry point of a large production network and processed by Snort, a commonly used IDS. The processing times of the three main stages in Snort were measured. The main conclusions of our study were: (1) rule checking accounts for about 75% of the total processing time in IDSs, with mean pay load checking time being 4.5 times larger than mean header checking time. (2) The distribution of rule checking limes is markedly bimodal, a direct consequence of the bimodality in packet composition in current high speed Internet traffic. (3) Header processing times have a small variance and small correlation coefficients. (4) In contrast, the distribution of payload processing times displays high variance, in a form that can be generally characterized as "slightly heavy-tailed". Explicitly, payload processing times have a lognormal upper tail, clipped at the top 1%. This extreme 1% upper tail is better fit by an exponential distribution. (5) Additionally, payload processing times were shown to be highly correlated, with correlation coefficients several orders of magnitude higher than the confidence bands for the standard whiteness test. The impact of these findings in the design of IDSs for real time operation in networks is discussed, and compared with existing results for processing times for Unix processes, which were shown to display pronounced heavy-tailed characteristics.
Keywords :
Internet; exponential distribution; information systems; security of data; telecommunication traffic; Internet traffic; Snort; Unix processes; exponential distribution; lognormal upper tail; network intrusion detection system; payload processing times; security violations; statistical distribution; Data security; Displays; Information security; Information systems; Internet; Intrusion detection; Monitoring; Payloads; Production; Statistical distributions;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Decision and Control, 2004. CDC. 43rd IEEE Conference on
ISSN :
0191-2216
Print_ISBN :
0-7803-8682-5
Type :
conf
DOI :
10.1109/CDC.2004.1428609
Filename :
1428609
Link To Document :
بازگشت