2008 IEEE International Symposium on Workload Characterization 2008
DOI: 10.1109/iiswc.2008.4636093
|View full text |Cite
|
Sign up to set email alerts
|

A workload for evaluating deep packet inspection architectures

Abstract: Abstract-High-speed content inspection of network traffic is an important new application area for programmable networking systems, and has recently led to several proposals for high-performance regular expression matching. At the same time, the number and complexity of the patterns present in well-known network intrusion detection systems has been rapidly increasing. This increase is important since both the practicality and the performance of specific pattern matching designs are strictly dependent upon char… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
74
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 101 publications
(82 citation statements)
references
References 16 publications
(44 reference statements)
0
74
0
Order By: Relevance
“…Since the NIDS is most burdened under matching traffic a rule-derived traffic generator is the logical choice for imposing load on the target system [7], [8]. The rule-derived traffic model fills the payload of a packet using a sequence of bytes built through a random traversal of the very automaton used by the NIDS to match traffic.…”
Section: Workload Generation For Signature-based Nidsmentioning
confidence: 99%
See 2 more Smart Citations
“…Since the NIDS is most burdened under matching traffic a rule-derived traffic generator is the logical choice for imposing load on the target system [7], [8]. The rule-derived traffic model fills the payload of a packet using a sequence of bytes built through a random traversal of the very automaton used by the NIDS to match traffic.…”
Section: Workload Generation For Signature-based Nidsmentioning
confidence: 99%
“…2 evaluation techniques for NIDS are often inadequate. The makeup of the traffic typically lacks the diversity to sufficiently evaluate the NIDS [7], [8], [19]. The primary problem is that most traffic generators focus on creating realistic traffic, not on creating traffic to specifically stress the detection algorithms of NIDS.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Performance and scalability of regex-based traffic classification has been extensively studied [4,18,44]. Alternative protocol identification strategies that have been explored include using packet sizes and timings [6,51], the types and number connections initiated by a host (its "social behavior") [23,26], and various machine learning techniques [33,34,55].…”
Section: Related Workmentioning
confidence: 99%
“…In [7], the skewness in network traffic distribution was utilized to yield effective attacks. Recently, attacks based on algorithmic complexity were proposed for Snort [8], [9] and regular expression matching systems [10].…”
Section: B Related Workmentioning
confidence: 99%