Vis enkel innførsel

dc.contributor.authorHaugerud, Hårek
dc.contributor.authorTran, Huy Nhut
dc.contributor.authorAitsaadi, Nadjib
dc.contributor.authorYazidi, Anis
dc.date.accessioned2022-03-21T13:21:12Z
dc.date.available2022-03-21T13:21:12Z
dc.date.created2021-07-22T12:05:12Z
dc.date.issued2021
dc.identifier.citationFuture generations computer systems. 2021, 124 254-267.en_US
dc.identifier.issn0167-739X
dc.identifier.urihttps://hdl.handle.net/11250/2986533
dc.description.abstractA Network Intrusion Detection System (NIDS) is a fundamental security tool. However, under heavy network traffic, a NIDS might become a bottleneck. In an overloaded state, incoming and outgoing packets in the network might suffer from long delays since previous packets are still being inspected, and eventually the NIDS starts to drop packets when it runs out of hardware resources. Although many solutions have been suggested in the literature to counter this problem, they are not completely reliable as each of them has limitations. This paper investigates the design of a lightweight elastic architecture which allows parallel processing in an existing NIDS while maintaining the filtering integrity. Furthermore, we propose two adaptive algorithms which dynamically adjust and divide the signature rules evenly across NIDS nodes using a node level parallelism method in order to achieve intelligent rule ordering. We test our approaches in real-life settings by implementing a functioning prototype involving different modern networking technologies. The prototype presented is a Network Function Virtualization (NFV) of an intrusion detection system which utilizes Open vSwitch and Docker containers running Snort in order to provide an elastic system. To the best of our knowledge, there has been no work that orchestrates both scaling and rule splitting and re-ordering of IDS signatures as a part of a holistic elastic IDS solution. The results of this study show that the proposed algorithms are able to equally split the IDS workload and thereby enabling the system to scale by adjusting the number of virtual components which analyse the network traffic. At the same time the experiments indicate that the algorithms can be tuned by a single parameter in order to avoid that some packets go unexamined while simultaneously craving a minimum of the dynamically available computer resources.en_US
dc.language.isoengen_US
dc.publisherElsevieren_US
dc.rightsNavngivelse 4.0 Internasjonal*
dc.rights.urihttp://creativecommons.org/licenses/by/4.0/deed.no*
dc.titleA dynamic and scalable parallel Network Intrusion Detection System using intelligent rule ordering and Network Function Virtualizationen_US
dc.typeJournal articleen_US
dc.typePeer revieweden_US
dc.description.versionpublishedVersionen_US
dc.source.pagenumber254-267en_US
dc.source.volume124en_US
dc.source.journalFuture generations computer systemsen_US
dc.identifier.doi10.1016/j.future.2021.05.037
dc.identifier.cristin1922412
cristin.ispublishedtrue
cristin.fulltextpostprint
cristin.fulltextpostprint
cristin.qualitycode2


Tilhørende fil(er)

Thumbnail

Denne innførselen finnes i følgende samling(er)

Vis enkel innførsel

Navngivelse 4.0 Internasjonal
Med mindre annet er angitt, så er denne innførselen lisensiert som Navngivelse 4.0 Internasjonal