期刊文献+

并行入侵检测系统的动态自适应负载均衡算法 被引量:2

A Dynamic Adaptive Load Balancing Algorithm in Parallel IDS
下载PDF
导出
摘要 网络入侵检测系统的处理速度难以跟上网络的速度,使用多个分析引擎并行处理网络报文可以大幅度提高网络入侵检测系统的性能。考虑到负载均衡的要求,提出了一种并行入侵检测系统的动态自适应负载均衡算法,该算法给每个分析引擎设置了一个数据包接受区间,通过对网络报文的报头信息做哈希运算,把数据包映射到分析引擎的接收区间内;根据分析引擎的处理能力和负载情况调节各个分析引擎接受区间的宽度,从而合理分配每个分析引擎上的网络流量,充分利用所有分析引擎的计算能力。理论分析和实验结果表明,该算法在高带宽环境中有较高的效率。 As the band of computer networks increases,the processing speed of network intrusion detection system hardly keeps up with the speed of networks.By arranging several analysis engines to deal with the traffic in parallel,the intrusion detection system's throughput can be significantly increased.There is an emerging need for parallel intrusion detection techniques that can keep up with the increased network throughput.A novel algorithm of load balancing among parallel IDS(Intrusion Detection System) was proposed to improve detection ability of parallel IDS.The algorithm was adopted to hash the network packet header information in packet,to map the corresponding packet to scope of the analysis engines' number,and to adjust the scope according to the performance and load of each sensor.Theoretic analysis and experimental results demonstrate that the algorithm can dispatch packets reasonably and utilize all the analysis engines' sources effectively.
出处 《盐城工学院学报(自然科学版)》 CAS 2011年第4期39-43,共5页 Journal of Yancheng Institute of Technology:Natural Science Edition
基金 江苏省盐城市科技发展计划项目(YK2009092) 江苏省现代教育技术研究项目(2010R15239)
关键词 并行入侵检测 负载均衡 高可用性 哈希函数 parallel IDS load balancing high availability hash function
  • 相关文献

参考文献8

  • 1Schaelicke L, Slabach T, Moore B, et al. Characterizing the performance of network intrusion detection sensors [ C ]. Proceedings of the Sixth International Symposium on Recent Advances in Intrusion Detection ( RAID 2003). Lecture Notes in Computer Science, Springer - Verlag, 2003.
  • 2Edwards S. Vulnerabilities of Network Intrusion Detection Systems : Realizing and Overcoming the Risks[ Z]. Toplayer Net- works, 2002.
  • 3Coit J, Staniford S, McMerney J. Towards faster string matching for intrusion detection or exceeding the speed of snort [C]. Proc DARPA Information Survivability Conference and Exposition (DISCEX II). Los Mamitos, Calif: IEEE CS Press, 2001:367 - 373.
  • 4Kruegel C, Valeur F, Vigna G, et al. Stateful intrusion detection for high -speed networks [ C ]. Proceedings of the IEEE Symposium on Security and Privacy. Berkeley, CA: IEEE, 2002:285 - 294.
  • 5Bestavros A, Crovella M E, Liu J, etal. Distributed Packet Rewriting and Its Application to Scalable Server Architectures [ C]. Proceedings of 6th IEEE International Conference on Network Protocols, 2007:290- 296.
  • 6Dias D M, Kish W, Mukherjee R, etal. A Scalable and Highly Available Web Server[C]. Proc. of41st IEEE Computer Society Intl. Conf. ( COMPCON 2005), 2008,2:85 - 92.
  • 7Leland W E, Taqqu M S, Willinger W, etal On the Self- similar Nature of Ethemet Traffic[ J ]. IEEE/ACM Transactions on Networking, 2011,2( 1 ) :1 - 15.
  • 8Abry P, Veitch D. Wavelet Analysis of Long range dependent Traffic [ J ]. IEEE Trans. on Information Theory, 2008,44 (1) :2-15.

同被引文献4

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部