Predicting the Resource Consumption of Network Intrusion Detection Systems

  • Authors:
  • Holger Dreger;Anja Feldmann;Vern Paxson;Robin Sommer

  • Affiliations:
  • Siemens AG, Corporate Technology,;Deutsche Telekom Labs / TU Berlin,;UC Berkeley, and International Computer Science Institute,;International Computer Science Institute, and Lawrence Berkeley National Laboratory,

  • Venue:
  • RAID '08 Proceedings of the 11th international symposium on Recent Advances in Intrusion Detection
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

When installing network intrusion detection systems (NIDSs), operators are faced with a large number of parameters and analysis options for tuning trade-offs between detection accuracy versus resource requirements. In this work we set out to assist this process by understanding and predicting the CPU and memory consumption of such systems. We begin towards this goal by devising a general NIDS resource model to capture the ways in which CPU and memory usage scale with changes in network traffic. We then use this model to predict the resource demands of different configurations in specific environments. Finally, we present an approach to derive site-specific NIDS configurations that maximize the depth of analysis given predefined resource constraints. We validate our approach by applying it to the open-source Bro NIDS, testing the methodology using real network data, and developing a corresponding tool, nidsconf, that automatically derives a set of configurations suitable for a given environment based on a sampleof the site's traffic. While no automatically generated configuration can ever be optimal, these configurations provide sound starting points, with promise to significantly reduce the traditional trial-and-error NIDS installation cycle.