Javascript must be enabled to continue!
Alamut: a high‐performance network intrusion detection system in support of virtualized environments
View through CrossRef
ABSTRACTOne of the benefits of virtualization technology is the provision of secure and isolated computing environments on a single physical machine. However, the use of virtual machines for this purpose often degrades the overall system performance that is due to emulation costs, for example, packet filtering on every virtual machine. To allow virtual machines to be favorably used as before for the provision of secure environments but with comparably less performance degradation, we propose a new architecture called Alamut in this paper for restructuring any typical network intrusion detection system (NIDS) to run in a Xen‐based virtual execution environment. In the proposed architecture, primitive mechanisms for implementing the security concerns of typical NIDSs such as signature matching are placed at the kernel level of driver domain (dom0), whereas security policies and management modules are kept in user space of that domain. Separation of mechanisms from policies allows network packets to be verified at the kernel level first hand more efficiently without requiring costly context switches to push them to user space for validation. In addition, system administrators can easily define new policies at user level and determine on which virtual machines these policies should be enforced. A proof‐of‐concept implementation of Alamut has been prototyped on the Xen hypervisor using Bro open‐source NIDS. Experimental results show approximately 3.5‐fold increase in the overall system performance when our prototype is run compared with when Bro is run. Results also show 19% improvement in network throughput. The comparison of Alamut with Snort with the same set of signatures and attacks shows that our prototyped NIDS has lower processor utilization and has captured more packets in heavy network loads. Copyright © 2013 John Wiley & Sons, Ltd.
Title: Alamut: a high‐performance network intrusion detection system in support of virtualized environments
Description:
ABSTRACTOne of the benefits of virtualization technology is the provision of secure and isolated computing environments on a single physical machine.
However, the use of virtual machines for this purpose often degrades the overall system performance that is due to emulation costs, for example, packet filtering on every virtual machine.
To allow virtual machines to be favorably used as before for the provision of secure environments but with comparably less performance degradation, we propose a new architecture called Alamut in this paper for restructuring any typical network intrusion detection system (NIDS) to run in a Xen‐based virtual execution environment.
In the proposed architecture, primitive mechanisms for implementing the security concerns of typical NIDSs such as signature matching are placed at the kernel level of driver domain (dom0), whereas security policies and management modules are kept in user space of that domain.
Separation of mechanisms from policies allows network packets to be verified at the kernel level first hand more efficiently without requiring costly context switches to push them to user space for validation.
In addition, system administrators can easily define new policies at user level and determine on which virtual machines these policies should be enforced.
A proof‐of‐concept implementation of Alamut has been prototyped on the Xen hypervisor using Bro open‐source NIDS.
Experimental results show approximately 3.
5‐fold increase in the overall system performance when our prototype is run compared with when Bro is run.
Results also show 19% improvement in network throughput.
The comparison of Alamut with Snort with the same set of signatures and attacks shows that our prototyped NIDS has lower processor utilization and has captured more packets in heavy network loads.
Copyright © 2013 John Wiley & Sons, Ltd.
Related Results
Assessment of Network & Processor Virtualization in Cloud Computing
Assessment of Network & Processor Virtualization in Cloud Computing
Cloud Computing is an emerging field in applied computer science. Cloud computing depends on virtualization, where a sole physical resource is virtualized into numerous virtual res...
Re-orientalizing the Assassins in Western historical-fiction literature: Orientalism and self-Orientalism in Bartol’s Alamut, Tarr’s Alamut, Boschert’s Assassins of Alamut and Oden’s Lion of Cairo
Re-orientalizing the Assassins in Western historical-fiction literature: Orientalism and self-Orientalism in Bartol’s Alamut, Tarr’s Alamut, Boschert’s Assassins of Alamut and Oden’s Lion of Cairo
The article analyzes the novelistic representations of the Assassins, originally a nickname for the Islamic sect of Nizari Ismailis that gained an almost independent currency in We...
Network intrusion detection method based on IEHO-SVM
Network intrusion detection method based on IEHO-SVM
As the growth of network technology, the network intrusion has become increasingly serious. An elephant herding optimization algorithm and support vector machine-based network intr...
MULTI-OBJECTIVE WHALE OPTIMIZED WITH RECURRENT DEEP LEARNING FOR EFFICIENT INTRUSION DETECTION IN HIGH SENSITIVE NETWORK TRAFFIC
MULTI-OBJECTIVE WHALE OPTIMIZED WITH RECURRENT DEEP LEARNING FOR EFFICIENT INTRUSION DETECTION IN HIGH SENSITIVE NETWORK TRAFFIC
Intrusion detection plays a pivotal aspect in providing security for the information and the main technology lies in identifying different networks in an accurate as well as precis...
Research on campus network security protection system framework based on cloud data and intrusion detection algorithm
Research on campus network security protection system framework based on cloud data and intrusion detection algorithm
AbstractThe continuous progress of society has created conditions for the widespread use of information technology. People rely more and more on information technology and the Inte...
Network Intrusion Detection Utilizing Autoencoder Neural Networks
Network Intrusion Detection Utilizing Autoencoder Neural Networks
In today's interconnected digital landscape, protecting computer networks from unauthorized access and cyber threats is critically important. Network Intrusion Detection Systems (N...
eBF: An Enhanced Bloom Filter for Intrusion Detection in IoT
eBF: An Enhanced Bloom Filter for Intrusion Detection in IoT
Abstract
Intrusion detection is an essential process to identify malicious incidents and continuously alert the many users of the Internet of Things (IoT). The constant mon...
Research on hybrid intrusion detection method based on the ADASYN and ID3 algorithms
Research on hybrid intrusion detection method based on the ADASYN and ID3 algorithms
<abstract>
<p>Intrusion detection system plays an important role in network security. Early detection of the potential attacks can prevent the further network intrusion...

