• DocumentCode
    2415335
  • Title

    Design Consideration and Implementation of Portscan Detection Module on NP-Based IDS

  • Author

    Xu, Xiancheng ; Zhang, Ling ; Dong, Shoubin

  • Author_Institution
    Commun. & Comput. Network Lab. of Guangdong, South China Univ. of Technol., Guangzhou, China
  • fYear
    2010
  • fDate
    7-9 May 2010
  • Firstpage
    1323
  • Lastpage
    1326
  • Abstract
    In this paper we describe the design consideration and implementation of portscan detection module regarding to TCP analyzing of SCUT NIDS. The aim of the portscan module is to take immediate action in response to alerts generated by SCUT NIDS to protect the system from portscan attacks. Portscan module is required to maintain TCP connection records, the design of such a connection table is not trivial for a high speed IDS with large number of active connections and high packet arrival rate,especially in a resource constrains Intel IXP2400 network processor. After comparing various design options, we adapted from hash table data structure, employing the special hardware unit assist to calculate a hash over our unique ascending order quadruple which worked in a quite simple but efficient way that is totally different from the Snort scheme, our design not only differentiates both directions of a TCP connection and thus eliminates unwanted additional search operation, but also avoids data corruption and greatly reduces the probability of hash collisions. In order to improve the allocation/deallocation procedure for TCP connection nodes in our IDS systems, we further devised a large management stack caching with a local memory buffer, which is fully exploiting the specialized network processor architectures and optimizing the use of various types of memories with different speeds and size. The theoretical analysis and experiments confirmed that the combination of a large conventional hash table-based search and an array-based stack with caching improves the performance significantly.
  • Keywords
    cache storage; computer network security; cryptography; parallel processing; transport protocols; NP based IDS; SCUT NIDS; TCP; array based stack; hash table; network processor architecture; portscan detection module; stack caching; Context; Delay; IP networks; Intrusion detection; Memory management; Random access memory; Resource management; IDS; hash table; nework processor; stack and cache;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    E-Business and E-Government (ICEE), 2010 International Conference on
  • Conference_Location
    Guangzhou
  • Print_ISBN
    978-0-7695-3997-3
  • Type

    conf

  • DOI
    10.1109/ICEE.2010.338
  • Filename
    5591627