Tracking Network Events with Write Optimized Data Structures: The Design and Implementation of TWIAD: The Write-Optimized IP Address Database

11/30/2015
by   Nolan Donoghue, et al.
0

Access to network traffic records is an integral part of recognizing and addressing network security breaches. Even with the increasing sophistication of network attacks, basic network events such as connections between two IP addresses play an important role in any network defense. Given the duration of current attacks, long-term data archival is critical but typically very little of the data is ever accessed. Previous work has provided tools and identified the need to trace connections. However, traditional databases raise performance concerns as they are optimized for querying rather than ingestion. The study of write-optimized data structures (WODS) is a new and growing field that provides a novel approach to traditional storage structures (e.g., B-trees). WODS trade minor degradations in query performance for significant gains in the ability to quickly insert more data elements, typically on the order of 10 to 100 times more inserts per second. These efficient, out-of-memory data structures can play a critical role in enabling robust, long-term tracking of network events. In this paper, we present TWIAD, the Write-optimized IP Address Database. TWIAD uses a write-optimized B-tree known as a B ϵ tree to track all IP address connections in a network traffic stream. Our initial implementation focuses on utilizing lower cost hardware, demonstrating that basic long-term tracking can be done without advanced equipment. We tested TWIAD on a modest desktop system and showed a sustained ingestion rate of about 20,000 inserts per second.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
08/15/2019

"LOADS of Space": Local Order Agnosticism and Bit Flip Efficient Data Structure Codes

Algorithms, data structures, coding techniques, and other methods that r...
research
11/17/2017

Algorithms and Data Structures to Accelerate Network Analysis

As the sheer amount of computer generated data continues to grow exponen...
research
04/20/2018

Two Use Cases of Machine Learning for SDN-Enabled IP/Optical Networks: Traffic Matrix Prediction and Optical Path Performance Prediction

We describe two applications of machine learning in the context of IP/Op...
research
10/12/2022

IPv6 over Bluetooth Advertisements: An alternative approach to IP over BLE

The IPv6 over Bluetooth Low Energy (BLE) standard defines the transfer o...
research
06/23/2021

Advancing Protocol Diversity in Network Security Monitoring

With information technology entering new fields and levels of deployment...
research
06/06/2019

Degree-based Outlier Detection within IP Traffic Modelled as a Link Stream

This paper aims at precisely detecting and identifying anomalous events ...
research
02/04/2022

Direct Telemetry Access

The emergence of programmable switches allows operators to collect a vas...

Please sign up or login with your details

Forgot password? Click here to reset