Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Alamut: a high‐performance network intrusion detection system in support of virtualized environments

View through CrossRef
ABSTRACTOne of the benefits of virtualization technology is the provision of secure and isolated computing environments on a single physical machine. However, the use of virtual machines for this purpose often degrades the overall system performance that is due to emulation costs, for example, packet filtering on every virtual machine. To allow virtual machines to be favorably used as before for the provision of secure environments but with comparably less performance degradation, we propose a new architecture called Alamut in this paper for restructuring any typical network intrusion detection system (NIDS) to run in a Xen‐based virtual execution environment. In the proposed architecture, primitive mechanisms for implementing the security concerns of typical NIDSs such as signature matching are placed at the kernel level of driver domain (dom0), whereas security policies and management modules are kept in user space of that domain. Separation of mechanisms from policies allows network packets to be verified at the kernel level first hand more efficiently without requiring costly context switches to push them to user space for validation. In addition, system administrators can easily define new policies at user level and determine on which virtual machines these policies should be enforced. A proof‐of‐concept implementation of Alamut has been prototyped on the Xen hypervisor using Bro open‐source NIDS. Experimental results show approximately 3.5‐fold increase in the overall system performance when our prototype is run compared with when Bro is run. Results also show 19% improvement in network throughput. The comparison of Alamut with Snort with the same set of signatures and attacks shows that our prototyped NIDS has lower processor utilization and has captured more packets in heavy network loads. Copyright © 2013 John Wiley & Sons, Ltd.
Title: Alamut: a high‐performance network intrusion detection system in support of virtualized environments
Description:
ABSTRACTOne of the benefits of virtualization technology is the provision of secure and isolated computing environments on a single physical machine.
However, the use of virtual machines for this purpose often degrades the overall system performance that is due to emulation costs, for example, packet filtering on every virtual machine.
To allow virtual machines to be favorably used as before for the provision of secure environments but with comparably less performance degradation, we propose a new architecture called Alamut in this paper for restructuring any typical network intrusion detection system (NIDS) to run in a Xen‐based virtual execution environment.
In the proposed architecture, primitive mechanisms for implementing the security concerns of typical NIDSs such as signature matching are placed at the kernel level of driver domain (dom0), whereas security policies and management modules are kept in user space of that domain.
Separation of mechanisms from policies allows network packets to be verified at the kernel level first hand more efficiently without requiring costly context switches to push them to user space for validation.
In addition, system administrators can easily define new policies at user level and determine on which virtual machines these policies should be enforced.
A proof‐of‐concept implementation of Alamut has been prototyped on the Xen hypervisor using Bro open‐source NIDS.
Experimental results show approximately 3.
5‐fold increase in the overall system performance when our prototype is run compared with when Bro is run.
Results also show 19% improvement in network throughput.
The comparison of Alamut with Snort with the same set of signatures and attacks shows that our prototyped NIDS has lower processor utilization and has captured more packets in heavy network loads.
Copyright © 2013 John Wiley & Sons, Ltd.

Related Results

Temporal integration of monaural and dichotic frequency modulation
Temporal integration of monaural and dichotic frequency modulation
Frequency modulation (FM) detection at low modulation frequencies is commonly used as an index of temporal fine structure processing to demonstrate age- and hearing-related deficit...
Estimates of Maize Plant Density from UAV RGB Images Using Faster-RCNN Detection Model: Impact of the Spatial Resolution
Estimates of Maize Plant Density from UAV RGB Images Using Faster-RCNN Detection Model: Impact of the Spatial Resolution
Early-stage plant density is an essential trait that determines the fate of a genotype under given environmental conditions and management practices. The use of RGB images taken fr...
Fusion of Machine learning for Detection of Rumor and False Information in Social Network
Fusion of Machine learning for Detection of Rumor and False Information in Social Network
In recent years, spreading social media platforms and mobile devices led to more social data, advertisements, political opinions, and celebrity news proliferating fake news. Fake n...
From Alamut to Dadu: Jamāl al-Dīn’s Armillary Sphere on the Mongol Silk Roads
From Alamut to Dadu: Jamāl al-Dīn’s Armillary Sphere on the Mongol Silk Roads
This article aims to shed light on a hitherto unknown transmission route of the astral sciences from Alamut to Dadu (Beijing). I argue that the huntianyi 渾天儀, an armillary sphere, ...
Environmental Monitoring System by Using Unmanned Aerial Vehicle
Environmental Monitoring System by Using Unmanned Aerial Vehicle
This paper presents a reliable and low cost environmental monitoring system. The system uses an Unmanned Ariel Vehicle (UAV) equipped with a set of sensors, microcontroller, wirele...
High-Expectations Relationships: A Foundation for Enacting High Expectations in all Australian Schools
High-Expectations Relationships: A Foundation for Enacting High Expectations in all Australian Schools
Enacting high expectations for all students in the classroom is a complex undertaking. Underlying, out-of-awareness assumptions may lead to actions, behaviours or pedagogic choices...
Detection of whale calls in noise: Performance comparison between a beluga whale, human listeners, and a neural network
Detection of whale calls in noise: Performance comparison between a beluga whale, human listeners, and a neural network
This article examines the masking by anthropogenic noise of beluga whale calls. Results from human masking experiments and a software backpropagation neural network are compared to...

Back to Top