研究生: |
貝理 Zuhdi Jawad Bali |
---|---|
論文名稱: |
Memory Optimization and Performance Evaluation of Traffic Route in Network IDS |
指導教授: |
孫宏民
Hung-Min Sun |
口試委員: | |
學位類別: |
碩士 Master |
系所名稱: |
電機資訊學院 - 資訊系統與應用研究所 Institute of Information Systems and Applications |
論文出版年: | 2007 |
畢業學年度: | 95 |
語文別: | 英文 |
論文頁數: | 90 |
中文關鍵詞: | Intrusion detection system 、deep packet inspection 、NIDS 、Bro |
相關次數: | 點閱:4 下載:0 |
分享至: |
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
Since the emergence of intrusion detection systems (IDS) were developed to identify, and to report attacks in computer systems and networks, or against information systems in general, it has always been difficult to provide provably secure information systems that are maintained in a constant secure state throughout their operations. Therefore, the task of intrusion-detection systems is to monitor the usage of such systems, and to detect the apparition of insecure states through out their existence, in order to avoid serious disruption to network services. As a result of the above, we have propose to research and implement a framework that will accomplish our purpose of devising a complete packet scan engine, and evaluate the efficiency of our approach and algorithm, by conducting a wide range of data captured from the university campus. The result of these analyses will be used to investigate the possibility of determining the number of packets that can be verified by the packet scan engine, in order to reduce the cost of scanning the packets that pass through both SNORT and Bro rules. With this framework, large scale or co-ordinate anomalies can be detected in real time.
[1] S. T. Shafer and M. Jones, "Network edge courts apps," 2002, http://infoworld.com/article/02/05/27/020527newebdev_1.html”
[2] A. V. Aho and M. J. Corasick, "Efficient String Matching:An Aid to Bibliographic Search," in Communications of ACM, Vol. 18, 1975, pp. 333-340.
[3] B. Commentz-Walter, "A String Matching Algorithm Fast on the Average," in ICALP,LNCS, vol. 6, 1979, pp. 118-132
[4] S. Wu and U. Manber, "A Fast Algorithm for Multi-Pattern Searching," Computer Science, University of Arizona, TR:94-17, May, 1994.
[5] N. Tuck, T. Sherwood, B. Calder, and G. Varghese, "Deterministic Memory-Efficient String Matching Algorithms for Intrusion Detection," in IEEE Infocom,2004, pp. 333-340.
[6] L. Tan and T. Sherwood, "A High Throughput String Matching Architecture for Intrusion Detection and Prevention," in Proc. 32nd Annual International Symposium on Computer Architecture (LISA) Madison, Wisconsin, 2005, pp. 112-122.
[7] I. Sourdis and D. Pnevmatikatos, "Pre-decoded CAMs for Efficient and High-Speed NIDS Pattern Matching," in Annual IEEE Symposium on Field-Programmable Custom Computing Machines FCCM California, 2004, pp. 258-267.
[8] S. Yusuf and W. Luk, "Bitwise Optimised CAM for Network Intrusion Detection Systems," in IEEE Field Programmable Logic and Applications, 2005, pp. 311-321.
[9] R. Sommer and V. Paxson, "Enhancing byte-level network intrusion detection signatures with context," in Proc. of the ACM Conference on Computer and Communications Security (CCS), 2003, pp. 262-271.
[10] "TippingPoint X505," www.tippingpoint.com/products_ips.html.
[11] "Cisco IOS IPS Deployment Guide, " www.cisco.com
[12] F. Yu, Z. Chen, Y. Diao, T. V. Lakshman, and R. H. Katz, "Fast and Memory- Efficient Regular Expression Matching for Deep Packet Inspection," in Applied Cryptography and Network Security, 2006, pp. 3-7.
[13] S. Kumar, S. Dharmapurikar, F. Yu, P. Crowley, and J. Turner, "Algorithms to Accelerate Multiple Regular Expressions Matching for Deep Packet Inspection," in Proc. ACM SIGCOMM, 2006, pp. 342- 344.
[14] D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver, "Inside the Slammer Worm," in Proceedings of IEEE Security and Privacy, Vol.1, 2003, pp. 33-99.
[15] G. Memik, S. O. Memik, and W. H. Mangione-Smith, “Design and Analysis of a Layer Seven Network Processor Accelerator Using Reconfigurable Logic,” in IEEE Symposium on Field-Programmable Custom Computing Machines, April 2002, pp. 131-140.
[16] J. H. SALTZER, D. P. REED, and D. D. CLARK, "End-To-End Arguments in System Design," in ACM Transactions on Computer Systems, Vol. 2, No. 4, 1984, pp. 277-288.
[17] "ISC Domain Survey: Number of Internet Hosts," http://www.isc.org/index.pl?/ops/ds/host-count-history.php
[18] "SNORT Network Intrusion Detection System," http://www.snort.org.
[19] "Bro Intrusion Detection System," http://bro-ids.org/Overview.html.
[20] "CERT® Advisory CA-2001-19 "Code Red" Worm Exploiting Buffer Overflow In IIS Indexing Service DLL," 2002, http://www.cert.org/advisories/CA-2001-19.html”
[21] H. Zimmermann, "OSI Reference Model - The ISO Model of Architecture for Open Systems Interconnection," in IEEE Transactions on Communications No. 4, 1980, pp. 425-432.
[22] P. Gupta and N. McKeown, "Packet Classification on Multiple Fields," in ACM SIGCOMM, Vol 29, No 4, 1999, pp. 147-160.
[23] S. Singh, F. Baboescu, G. Varghese, and J. Wang, "Packet Classification Using Multidimensional Cutting," in Proc ACM SIGCOMM, 2003, pp. 213-224.
[24] "Cisco 2800 Series Integrated Services Routers Network Security Features on the Cisco Integrated Services Routers, ” http://www.cisco.com/en/US/products/ps5854/products_data_sheet0900aecd80169b0a.html.
[25] S.C. Kleene. Representation of events in nerve nets and finite automata. In C.E. Shannon and J. McCarthy, editors, Automata Studies, pages 3-42. Princeton University Press, Princeton, N.J., 1956.
[26] A. V. Aho, R. Sethi, and J. D. Ullman. Compilers: Principles, Techniques and
Tools. Addison-Wesley, Reading, MA, 1986.
[27] “Data-Based Decision Making,” http://www.ael.org
[28] “Wireshark Network Protocol Analyzer,” http://www.wireshark.org
[29] “Flex: The Fast Lexical Analyzer,” http://flex.sourceforge.net/
[30] V. Paxson, "Bro: A System for Detecting Network Intruders in Real-Time," in Proceedings of the 7th USENIX Security Symposium, 1998, p. 3.
[31] F. Yu, R. H. Katz, and T. V. Lakshman, "Efficient Multimatch Packet Classification and Lookup with TCAM," in EEE. Symposium on High Performance Interconnects, 2005, p. 51.