DocumentCode
2585192
Title
SIFT: snort intrusion filter for TCP
Author
Attig, Michael ; Lockwood, John
Author_Institution
Dept. of Comput. Sci. & Eng., Washington Univ., St. Louis, MO, USA
fYear
2005
fDate
17-19 Aug. 2005
Firstpage
121
Lastpage
127
Abstract
Intrusion rule processing in reconfigurable hardware enables intrusion detection and prevention services to run at multiGigabit/second rates. High-level intrusion rules mapped directly into hardware separate malicious content from benign content in network traffic. Hardware parallelism allows intrusion systems to scale to support fast network links, such as OC-192 and 10 Gbps Ethernet. In this paper, a snort intrusion filter for TCP (SIFT) is presented that operates as a preprocessor to prevent benign traffic from being inspected by an intrusion monitor running Snort. Snort is a popular open-source rule-processing intrusion system. SIFT selectively forwards IP packets that contain questionable headers or defined signatures to a PC where complete rule processing is performed. SIFT alleviates the need for most network traffic from being inspected by software. Statistics, like how many packets match rules, are used to optimize rule processing systems. SIFT has been implemented and tested in FPGA hardware and used to process Internet traffic from a campus Internet backbone with live data.
Keywords
IP networks; Internet; field programmable gate arrays; information filters; open systems; parallel architectures; reconfigurable architectures; security of data; transport protocols; 10 Gbit/s; FPGA; IP packet; Internet; TCP; benign network traffic; intrusion detection-prevention; intrusion rule processing; multiGigabit-second rate; open-source SIFT; preprocessor; questionable header; reconfigurable hardware parallelism; signature segmentation; snort intrusion filter; Ethernet networks; Filters; Hardware; Internet; Intrusion detection; Monitoring; Open source software; Statistics; TCPIP; Telecommunication traffic;
fLanguage
English
Publisher
ieee
Conference_Titel
High Performance Interconnects, 2005. Proceedings. 13th Symposium on
ISSN
1550-4794
Print_ISBN
0-7695-2449-4
Type
conf
DOI
10.1109/CONECT.2005.33
Filename
1544587
Link To Document