Recent Advances in Intrusion Detection

Volume 5230 of the series Lecture Notes in Computer Science pp 135-154

Predicting the Resource Consumption of Network Intrusion Detection Systems

  • Holger DregerAffiliated withSiemens AG, Corporate Technology
  • , Anja FeldmannAffiliated withDeutsche Telekom Labs / TU Berlin
  • , Vern PaxsonAffiliated withUC BerkeleyInternational Computer Science Institute
  • , Robin SommerAffiliated withInternational Computer Science InstituteLawrence Berkeley National Laboratory

* Final gross prices may vary according to local VAT.

Get Access


When installing network intrusion detection systems (NIDSs), operators are faced with a large number of parameters and analysis options for tuning trade-offs between detection accuracy versus resource requirements. In this work we set out to assist this process by understanding and predicting the CPU and memory consumption of such systems. We begin towards this goal by devising a general NIDS resource model to capture the ways in which CPU and memory usage scale with changes in network traffic. We then use this model to predict the resource demands of different configurations in specific environments. Finally, we present an approach to derive site-specific NIDS configurations that maximize the depth of analysis given predefined resource constraints. We validate our approach by applying it to the open-source Bro NIDS, testing the methodology using real network data, and developing a corresponding tool, nidsconf, that automatically derives a set of configurations suitable for a given environment based on a sample of the site’s traffic. While no automatically generated configuration can ever be optimal, these configurations provide sound starting points, with promise to significantly reduce the traditional trial-and-error NIDS installation cycle.