Tamper-Proof Network Traffic Measurements on a NIC for Intrusion Detection

Meet Udeshi, Prashanth Krishnamurthy, Ramesh Karri, Farshad Khorrami

Research output: Contribution to journalArticlepeer-review

Abstract

Cyber attacks can infect networked devices with rootkits that provide full-system access of the operating system to malicious actors. Rootkits can hide malicious network activity by tampering with network traffic monitoring on the host and interfere with the functioning of host-based intrusion detection systems (HIDS). Network interface cards (NICs) operate outside the host domain, so they cannot be tampered with easily by the rootkit. We present a framework that leverages the NIC to collect tamper-proof network traffic measurements for the HIDS. We provide two efficient implementations to collect measurements of high speed traffic (10Gbps), the Associative Table and the Count-Min Sketch. Our framework can collect reliably accurate measurements with negligible impact to network performance. The network throughput with measurement collection is within 99.5% of the throughput without collection. The implementation adds only 12 to 23 microseconds of latency.

Original languageEnglish (US)
JournalIEEE Transactions on Network and Service Management
DOIs
StateAccepted/In press - 2024

Keywords

  • intrusion detection system
  • network interface cards
  • network security

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Tamper-Proof Network Traffic Measurements on a NIC for Intrusion Detection'. Together they form a unique fingerprint.

Cite this