Conservative vs. Optimistic Parallelization of Stateful Network Intrusion Detection

Derek L. Schuff, Yung Ryn Choe, Vijay S. Pai
{"title":"Conservative vs. Optimistic Parallelization of Stateful Network Intrusion Detection","authors":"Derek L. Schuff, Yung Ryn Choe, Vijay S. Pai","doi":"10.1145/1229428.1229455","DOIUrl":null,"url":null,"abstract":"This paper presents and experimentally analyzes the performance of three parallelization strategies for the popular open-source Snort network intrusion detection system (NIDS). The parallelizations include 2 conservative variants and 1 optimistic scheme. The conservative strategy parallelizes inspection at the level of TCP/IP flows, as any potential inter-packet dependences are confined to a single flow. The flows are partitioned among threads, and each flow is processed in-order at one thread. A second variation reassigns flows between threads to improve load balance but still requires that only one thread process a given flow at a time. The flow-concurrent scheme provides good performance for 3 of the 5 network packet traces studied, reaching as high as 4.1 speedup and 3.1 Gbps inspection rate on a commodity 8-core server. Dynamic reassignment does not improve performance scalability because it introduces locking overheads that offset any potential benefits of load balancing. Neither conservative version can achieve good performance, however, without enough concurrent networkflows. For this case, this paper presents an optimistic parallelization that exploits the observation that not all packets from a flow are actually connected by dependences. This system allows a single flow to be simultaneously processed by multiple threads, stalling if an actual dependence is found. The optimistic version has additional overheads that reduce speedup by 25% for traces with flow concurrency, but its benefits allow one additional trace to see substantial speedup (2.4 on five cores).","PeriodicalId":137239,"journal":{"name":"ISPASS 2008 - IEEE International Symposium on Performance Analysis of Systems and software","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"33","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"ISPASS 2008 - IEEE International Symposium on Performance Analysis of Systems and software","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/1229428.1229455","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 33

Abstract

This paper presents and experimentally analyzes the performance of three parallelization strategies for the popular open-source Snort network intrusion detection system (NIDS). The parallelizations include 2 conservative variants and 1 optimistic scheme. The conservative strategy parallelizes inspection at the level of TCP/IP flows, as any potential inter-packet dependences are confined to a single flow. The flows are partitioned among threads, and each flow is processed in-order at one thread. A second variation reassigns flows between threads to improve load balance but still requires that only one thread process a given flow at a time. The flow-concurrent scheme provides good performance for 3 of the 5 network packet traces studied, reaching as high as 4.1 speedup and 3.1 Gbps inspection rate on a commodity 8-core server. Dynamic reassignment does not improve performance scalability because it introduces locking overheads that offset any potential benefits of load balancing. Neither conservative version can achieve good performance, however, without enough concurrent networkflows. For this case, this paper presents an optimistic parallelization that exploits the observation that not all packets from a flow are actually connected by dependences. This system allows a single flow to be simultaneously processed by multiple threads, stalling if an actual dependence is found. The optimistic version has additional overheads that reduce speedup by 25% for traces with flow concurrency, but its benefits allow one additional trace to see substantial speedup (2.4 on five cores).
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
有状态网络入侵检测的保守与乐观并行化
本文针对目前流行的开源Snort网络入侵检测系统(NIDS),提出并实验分析了三种并行化策略的性能。并行化包括2个保守方案和1个乐观方案。保守策略将TCP/IP流级别的检查并行化,因为任何潜在的包间依赖都限制在单个流中。流在线程之间进行分区,每个流在一个线程中按顺序处理。第二种变化是在线程之间重新分配流,以改善负载平衡,但仍然要求一次只有一个线程处理给定的流。流并发方案对所研究的5条网络数据包路径中的3条提供了良好的性能,在商用8核服务器上达到了4.1的加速和3.1 Gbps的检查率。动态重分配不会提高性能可伸缩性,因为它引入了锁定开销,抵消了负载平衡的任何潜在好处。但是,如果没有足够的并发网络流,这两个保守版本都无法实现良好的性能。对于这种情况,本文提出了一种乐观的并行化方法,该方法利用了并非来自流的所有数据包实际上都通过依赖关系连接的观察结果。该系统允许多个线程同时处理单个流,如果发现实际依赖关系,则会停止。乐观版本有额外的开销,使流并发跟踪的加速降低了25%,但它的好处是允许一个额外的跟踪看到实质性的加速(5核2.4)。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Scientific Computing Applications on a Stream Processor HMMer-Cell: High Performance Protein Profile Searching on the Cell/B.E. Processor Dynamic Thermal Management through Task Scheduling Program Phase Detection based on Critical Basic Block Transitions Trace-based Performance Analysis on Cell BE
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1