Carousel: Scalable Logging for Intrusion Prevention Systems
نویسندگان
چکیده
We address the problem of collecting unique items in a large stream of information in the context of Intrusion Prevention Systems (IPSs). IPSs detect attacks at gigabit speeds and must log infected source IP addresses for remediation or forensics. An attack with millions of infected sources can result in hundreds of millions of log records when counting duplicates. If logging speeds are much slower than packet arrival rates and memory in the IPS is limited, scalable logging is a technical challenge. After showing that naı̈ve approaches will not suffice, we solve the problem with a new algorithm we call Carousel. Carousel randomly partitions the set of sources into groups that can be logged without duplicates, and then cycles through the set of possible groups. We prove that Carousel collects almost all infected sources with high probability in close to optimal time as long as infected sources keep transmitting. We describe details of a Snort implementation and a hardware design. Simulations with worm propagation models show up to a factor of 10 improvement in collection times for practical scenarios. Our technique applies to any logging problem with noncooperative sources as long as the information to be logged appears repeatedly.
منابع مشابه
Considerations on Developing a Chainsaw Intrusion Detection and Localization System for Preventing Unauthorized Logging
This work presents a system designed to prevent unauthorized logging by detecting and locating chainsaw sound sources. We analyze the specifics of chainsaw related sounds and discuss about the possible approaches for classifying the input sounds. The work also highlights several approaches for sound source localization that can be used in wireless sensor network architecture for tracking the as...
متن کاملIdps Technologies: an Overview
1. Intrusion detection is the process of monitoring the events occurring in a computer system or network and analyzing them for signs of possible incidents, which are violations or imminent threats of violation of computer security policies, acceptable use policies, or standard security practices. Intrusion prevention is the process of performing intrusion detection and attempting to stop detec...
متن کاملAn Approach to UNIX Security Logging
Off-line intrusion detection systems rely on logged data. However, the logging mechanism may be complicated and time-consuming and the amount of logged data tends to be very large. To counter these problems we suggest a very simple and cheap logging method, light-weight logging. It can be easily implemented on a Unix system, particularly on the Solaris operating system from Sun. It is based on ...
متن کاملNew Data Mining Algorithm for Intrusion Detection in Networks
An intrusion detection system is a mechanism that monitors network or system activities for malicious activities. Intrusion detection and prevention systems (IDPS) are primarily focused on identifying possible incidents, logging information about them and reporting attempts .In organizations use IDPS for other purposes, such as identifying problems with security policies and deterring individua...
متن کاملHost Intrusion Detection System Comparison
What is the difference between a host-based intrusion detection system and a you agree to receive emails regarding relevant products and special offers. Agentless network-based threat detection and protection (Network IPS). delivers a consistent management experience across Data Center Security products. configuration monitoring, consolidated event logging, and file and system tamper a combinat...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2010