Mostra el registre d'ítem simple

dc.contributor.authorSreekar Shenoy, Govind
dc.contributor.authorTubella Murgadas, Jordi
dc.contributor.authorGonzález Colás, Antonio María
dc.contributor.otherUniversitat Politècnica de Catalunya. Departament d'Arquitectura de Computadors
dc.date.accessioned2013-05-28T11:41:21Z
dc.date.created2012
dc.date.issued2012
dc.identifier.citationSreekar Shenoy, G.; Tubella, J.; Gonzalez, A. Improving the performance efficiency of an IDS by exploiting temporal locality in network traffic. A: IEEE/ACM International Symposium on Modelling, Analysis and Simulation of Computer and Telecommunication Systems. "Proceedings of the 2012 IEEE 20th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems, MASCOTS 2012". 2012, p. 439-448.
dc.identifier.isbn978-076954793-0
dc.identifier.urihttp://hdl.handle.net/2117/19428
dc.description.abstractNetwork traffic has traditionally exhibited temporal locality in the header field of packets. Such locality is intuitive and is a consequence of the semantics of network protocols. However, in contrast, the locality in the packet payload has not been studied in significant detail. In this work we study temporal locality in the packet payload. Temporal locality can also be viewed as redundancy, and we observe significant redundancy in the packet payload. We investigate mechanisms to exploit it in a networking application. We choose Intrusion Detection Systems (IDS) as a case study. An IDS like the popular Snort operates by scanning packet payload for known attack strings. It first builds a Finite State Machine (FSM) from a database of attack strings, and traverses this FSM using bytes from the packet payload. So temporal locality in network traffic provides us an opportunity to accelerate this FSM traversal. Our mechanism dynamically identifies redundant bytes in the packet and skips their redundant FSM traversal. We further parallelize our mechanism by performing the redundancy identification concurrently with stages of Snort packet processing. IDS are commonly deployed in commodity processors, and we evaluate our mechanism on an Intel Core i3. Our performance study indicates that the length of the redundant chunk is a key factor in performance. We also observe important performance benefits in deploying our redundancy-aware mechanism in the Snort IDS[32].
dc.format.extent10 p.
dc.language.isoeng
dc.subjectÀrees temàtiques de la UPC::Enginyeria de la telecomunicació::Telemàtica i xarxes d'ordinadors
dc.subject.lcshTelecommunication -- Traffic -- Management
dc.subject.lcshComputer networks -- Security measures
dc.subject.otherDeep packet inspection
dc.subject.otherIntrusion detection systems
dc.subject.otherSoftware caches
dc.subject.otherSystem performance evaluation
dc.subject.otherTemporal locality
dc.titleImproving the performance efficiency of an IDS by exploiting temporal locality in network traffic
dc.typeConference report
dc.subject.lemacTelecomunicació -- Tràfic -- Gestió
dc.subject.lemacOrdinadors, Xarxes d' -- Mesures de seguretat
dc.contributor.groupUniversitat Politècnica de Catalunya. ARCO - Microarquitectura i Compiladors
dc.identifier.doi10.1109/MASCOTS.2012.56
dc.rights.accessRestricted access - publisher's policy
local.identifier.drac11110896
dc.description.versionPostprint (published version)
dc.date.lift10000-01-01
local.citation.authorSreekar Shenoy, G.; Tubella, J.; Gonzalez, A.
local.citation.contributorIEEE/ACM International Symposium on Modelling, Analysis and Simulation of Computer and Telecommunication Systems
local.citation.publicationNameProceedings of the 2012 IEEE 20th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems, MASCOTS 2012
local.citation.startingPage439
local.citation.endingPage448


Fitxers d'aquest items

Imatge en miniatura

Aquest ítem apareix a les col·leccions següents

Mostra el registre d'ítem simple