Genetic Algorithm Optimized Packet Filtering
|
|
|
- Bridget Douglas
- 10 years ago
- Views:
Transcription
1 , pp Genetic Algorithm Optimized Packet Filtering Okta Nurika 1, Nordin Zakaria 2 and Low Tan Jung 3 Department of Computer & Information Sciences Universiti Teknologi PETRONAS, Perak, Malaysia 1 [email protected], { 2 nordinzakaria, 3 lowtanjung}@petronas.com.my Abstract In this paper, we present a method to optimize packet filtering by genetic algorithm. Packet filtering in our work consists of packet capturing and firewall rules reordering. Genetic algorithm is used to automate rules reordering and the discovery of optimal combination of packet capture configuration, in the framework of PF_RING platform and rules ordering. Our method has been tested in different sizes of network traffic load. Genetic Algorithm evolves configuration based on the recorded throughput rates; the higher the throughput the better the solution. Results obtained indicate the effectiveness of the approach. Keywords: PF_RING; Packet Capture; Packet Filter; Genetic Algorithm; Optimization; Firewall 1. Introduction Packet capture is a method that enables users to capture and examine the contents of the data packets that go into a computer through network card [1]. Some purposes of packet capture includes troubleshooting network issues, examining network security, debugging protocol deployments, and studying the mechanism of network protocols [2]. PF_RING [3] is chosen as our platform of packet capture optimization and firewall rules reordering, which make up a packet filtering framework. PF_RING enables the development of network monitoring application and this can also contain firewall rule set. Applications that integrate PF_RING are for examples: Snort [4] and Suricata [5]. Our choice of PF_RING and genetic algorithm method are strengthened by previous works in Section II. Our methodology is explained in Section III. Section IV discusses about our experiments, results, and their analysis as well, where our optimization framework manages to optimize the overall packet filtering. Section V presents the conclusions of our work. Lastly, Section VI highlights the potential future works related to our research. 2. Related Works 2.1 Related Comparison Studies We choose PF_RING as our packet filtering platform motivated by the results of numerous researches that show the reliability of PF_RING [3, 6, 7, 8, 9, 10]. Some works related to our packet filtering parameters are done by [7] who recommend very big buffer size for FreeBSD, and [11, 12, 13] who recommend device polling. From the above works, we conclude that the configuration of packet capturing module has significant impact on the number of packets captured. This configuration setting should be ISSN: IJCA Copyright c 2013 SERSC
2 adjusted according to the rate of incoming traffic. Different traffic load requires different treatment or setting. 2.2 Genetic Algorithm (GA) GA is a search method to find near optimum solution, based on evolutionary natural selection process and genetics [14]. GA implements on population or group of chromosomes of potential solutions. GA shall generate the best combination of solution for specific problem. For every set of generation, it will create a new set of estimations by selecting chromosomes depending on their level of fitness, and then we can breed these chromosomes using genetic operators. This evolution is consequently expected to lead to better population. The genetic operators are mentioned below according to description by [14, 15]: 1. Reproduction: It is an operator to make copies of better chromosomes in a new population. 2. Crossover: An operator to recombine two chromosomes to get a better breed. 3. Mutation: It adds new value to the chromosomes in the search process. It maintains the diversity of population and to dig deeper into the search space. 4. Selection Method: A method to assign more copies of solutions with better fitness values, in order to give them higher probability to survive. 2.3 Previous GA Implementations in Computer Networks GA implementations in the area of computer networks have been done with positive results. This area includes packet filtering [15, 18], firewall rules accuracy [16], and packet classification [17]. Specifically, the need for GA in filter permutation optimization arises from the limitation of permutation optimization using adaptive pattern matching algorithm. This limitation occurs when the number of filters grows large (above 20) as stated by [19]. On the other hand, non-ga firewall rules optimization researches [20, 21, 22] use different methods to clean up firewall rules anomalies. Our work notices an opportunity to optimize packet capture rate by combining firewall rules reordering with the optimization of kernel parameters. This will be discussed in the next section. 3. Proposed GA Optimized Packet Filtering Framework 3.1 Implementation Our work fills up a research gap; GA has not been utilized to optimize both PF_RING kernel parameters and its firewall rules reordering, to our knowledge. This methodology is expected to boost the packet capture rate, compared to a system with firewall rules optimization but no kernel parameters optimized. It is recommended to initiate GA implementation using existing GA library to save implementation time [14]. GAlib [23] is a recommendation by [14]. In our work, we utilize a minimized version of GAlib called GAlite [24]. Our optimization case is based on PF_RING parameters. PF_RING is a Linux kernel patch that accelerates packet capturing by creating a ring buffer inside the kernel to eliminate the need of copying packets from kernel to application space memory [25]. Therefore, an 58 Copyright c 2013 SERSC
3 application can directly access this PF_RING buffer to process the packets without copying those packets to its memory space. Each combination of PF_RING parameters is a chromosome/individual. For each run, our GAlite application will generate values for these parameters, which then become the inputs to our PF_RING application. Our PF_RING application will run for 7 seconds, and then it generates a fitness value based on the total number of packets captured (throughput rate). This process repeats according to our GAlite application s algorithm and properties (number of generations, population size, etc.). Finally, the best chromosomes from each generation will be selected, which are then compared to each other to select the overall best chromosome. The selected best chromosome is the near optimum combination of PF_RING configuration and its firewall rules ordering. The above mentioned process of our methodology is illustrated in the Figure 1 below: Figure 1. GA Optimized Packet Filtering Framework 3.2 Parameters to be optimized by GA The permutations on PF_RING parameters which we have chosen, based on the official PF_RING manual by [26] are coded in pfcount. These parameters are listed below: 1. caplen or snaplen = the size of packet capture length. The range is between 64 bytes to the size of Maximum Transmission Unit (MTU) of the layer 2 protocol. In our research, the protocol is Ethernet with its MTU is 1500 bytes. But in our algorithm, we make the maximum MTU to be 1536 to accommodate the increase of MTU every 64 bytes, and also simplify the rounding of result. 2. active_ = ingress packet mode whether passive (poll) or active. When active takes place, every packet will activate kernel interrupt. While in passive, packets will be polled based on timer before kernel interrupt is called to process the packets. Integer 0 represents active and 1 represents passive mode as coded in PF_RING application. 3. watermark = packet poll watermark whether to make it low (reduce latency of poll but increase the number of poll calls) or make it high (increase the packet latency but reduce the number of poll calls). The range is 1 byte (check everytime for packet) until 50% of the maximum ring buffer size. In our research, the maximum ring buffer size is 4096, thus the maximum watermark value is cluster_type = cluster type whether per-flow or round-robin. In per-flow cluster type, Copyright c 2013 SERSC 59
4 each part of a packet transmission flow will go to the same cluster of buffer. While in round-robin cluster type, the chops of a packet transmission flow might go to the different cluster of buffer. 5. poll_duration = poll timeout in msec that takes care of data structures synchronization. According to [27], an acceptable clock interrupt delay for real time applications is around 100 ms to 200 ms. Additionally, [28] explains that the Linux system timer is programmed to generate a hardware interrupt 100 times in every second, which means that each hardware interrupt will take place every 10 ms. This concept has been affirmed by [29] that informs that in the Linux kernel, system timer ticks every 10 ms. Therefore, we conclude that when passive is chosen, the appropriate range of poll duration is 10 ms 200 ms with escalation every 10 ms. 6. Firewall rule set = a set of firewall rules that in our case consists of 13 rules. Each rule will be given randomly generated priority value. This firewall rules ordering mechanism applies in condition where there are more rules to accept packets, than the rules to drop them, since the only fitness value used is throughput rate. It is also a good method to reorder the rules, if the network administrator is faced with loads of existing firewall rules. The rule index in the chromosome starts from 5 to PF_RING Application s Representation of Chromosome Every chosen parameter is part of a chromosome which is indexed starting from zero (0). In other words, each parameter is a gene. In our GA implementation, every gene contains a float range value from 0-1 that will be randomly generated. Thus, specific formula for each parameter must be created to accommodate their real values from minimum to maximum. Below are the formulas based on C programming syntax, where gene(x) is the float random number generator ranging from 0-1: 1. snaplen = (gene(0) x 23) x active_ = (gene(1) > 0.5)? 1 : 0 3. watermark = (gene(2) x 89) x cluster_type = (gene(3) x > 0.5)? cluster_round_robin : cluster_per_flow 5. poll_duration = (gene(4) x 19) x firewall rule [ ] priority = gene(5) The pseudo code of pfcount below represents the mechanism of PF_RING itself. Read snaplen input; Read mode input { If (0) (Read poll duration = 0); If (1) (Read poll duration from input; } Read watermark input; Read poll duration input { If ( ) Poll duration = 0; Else Poll duration = input; Read cluster type input; Read firewall rules order input; PF_RING Socket Initialization; 60 Copyright c 2013 SERSC
5 While (true) { If (watermark = watermark input) Read incoming packets; Process incoming packets; Filter Incoming Packets; Count received packets; Generate throughput value; Else (poll duration times out) Read incoming packets; Process incoming packets; Filter Incoming Packets using Rules; Count received packets; Generate throughput value; } The words in bold in the above pseudo code indicate PF_RING parameters to be optimized. 4. Experiment Results and Analysis The experiment was conducted on a Virtual Box with CPU: AMD Athlon Neo X2 Dual Core L GHz (1 virtual CPU mode), AMD-V Hardware Virtualization with nested paging enabled, 512MB of RAM, Realtek PCIe GBE 1Gbps, Linux Kernel version , PF_RING 5.4.5, under Linux Debian Our packet capturing framework was measured against twenty-four levels of ping traffic load, according to the size of each packet injected (increase every 64 bytes), which are 64 up to 1536 bytes. These are considered low, medium, to high network traffic load. The initial GA properties itself generates 50 of population size, 50 generations, 0.2 of mutation probability, 0.4 of crossover probability, and tournament selection method. In tournament selection, two chromosomes are picked up randomly, then their fitness values will be compared, and after that the winner will be chosen to be the next individual. This process repeats until the specified number of population is achieved [14]. The best chromosomes were determined from every traffic load. Below are the table and graphs showing the throughput progression for each load, and patterns of the selected PF_RING parameters. Table 1. The Chosen Best Chromosome Contents for Different Traffic Loads No. Packet Size (bytes) Best Chromosome Throughput (bytes/7 sec) Snaplen (bytes) / Wait Watermark Value (bytes) Cluster Type Poll Duration (ms) Firewall Rules Order Per flow Per flow Round robin Per flow Per flow Per flow Per flow Per flow Per flow Per flow Round Copyright c 2013 SERSC 61
6 Per flow Per flow Per flow Round robin Per flow Round robin 80 robin Per flow Round robin Per flow Per flow Per flow Per flow Per flow Figure 2. Throughput Progression Figure 3. Snaplen Values Figure 2 and Table 1 show the sequential throughput rate from ping traffic penetration, starting from 64 until 1536 bytes of packet size. The throughput rate progression is stable from 64 until 1152 bytes of packet size with moderately constant progression. But starting from 1216 until 1536 bytes of packet size, the throughput rate started to progress with more unstable varieties in progression. This shows that optimization is mostly needed within this range. The former stability affirms the research result by [3] that claims PF_RING performs consistent at low packet sizes, despite if we look at our Figure 3, 4, and 5 below; the snaplen size, watermark value, and poll duration for each packet size have high significant difference. However, they do not block the consistency of PF_RING. 62 Copyright c 2013 SERSC
7 Referring to Figure 3 and Table 1, it is viewed that 62.5% of all traffic loads or 15 out of 24 have snaplen sizes, which are bigger than their packet size. From here, we can conclude that that there is relation between the size of snaplen and the packet capture rate. The snaplen size must be bigger than the size of each packet of the input traffic, which is logical. This practice will prevent segmentation that takes CPU cycle, which eventually makes the network analysis process even longer, since the fragmented segments have to be reassembled at the receiving application. The most significant improvements are seen at ping traffics with 768, 960, 1216, 1408, and 1536 bytes of packet size. These particular significant improvements of PF_RING have strengthened the claim by [3] and [7], who noticed that capturing a 1GE stream with big sized packet was much easier than capturing it with small sized packet (64 bytes). Figure 4. Watermark Values Figure 5. Poll Duration Values Figure 4 shows the watermark values for all traffic loads. The highest watermark value is 3426 bytes and the lowest is 114 bytes. The 3426 value actually exceeds the specified limit that is 2048 bytes, which was caused by the 7 significant digits of C++ float data type. Analysis from this figure generates 17 out of 24 or 70.83% of all traffic loads have watermark values, which are less than half of the highest recorded watermark value. This reflects that the recommended general watermark value is at most half of the specified maximum limit, although PF_RING will still perform well if it exceeds. The optimal value of watermark will make the network application not to too long before receiving the packets. Figure 5 displays the poll duration for every traffic load. We make the analysis based on three categories. First is for traffic loads that have poll duration equal or below half of highest specified duration (200 ms), second is for traffic loads that exceed half of highest specified duration (200 ms), and the last one is for traffic loads that equal or exceed highest specified duration (200 ms). The resulted categorization is listed in table below. Table 2. Resulted Poll Duration Categories Poll Duration Category Number of Traffic Load Duration < = 100ms ms < Duration < 200ms 7 Duration > = 200ms 6 Copyright c 2013 SERSC 63
8 Referring to Table 2, there are eleven traffic loads (45.83%) in the first category, which are 64, 256, 448, 576, 640, 704, 1152, 1216, 1344, 1408, and 1536 bytes. The second category has seven traffic loads (29.17%), each 384, 512, 768, 960, 1024, 1088, and 1280 bytes. Finally the third category includes 6 traffic loads (25%), namely 128, 192, 320, 832, 896, and Within the all categories, the traffic loads vary from low/small, moderate/medium, up to high. Additionally, the first category dominates with the most number of traffic loads. From this analysis, we interpret that it is generally suggested to deploy poll duration that is ranging from 10 until 100 ms, for the mentioned traffic load range ( bytes). Table 3. Portion of Wait Mode Utilization Wait Mode No. of Traffic Loads Wait 18 Wait 6 Table 4. Cluster Mode Utilization Cluster Mode No. of Traffic Loads Per Flow 19 Round Robin 5 Looking at Table 3, we can state that 75% or 18 out of 24 traffic loads were treated with Wait (no device polling). Based on Table 1, for traffic loads of bytes, there is only one traffic load (320 bytes) or 12.5% of this range that uses Wait (device polling), it means that within this range, the use of Wait (kernel interrupt for every packet) costs cheaper than device polling. Next, for traffic loads of bytes, there is also only one traffic load (1024 bytes) or 12.5% of this range using Wait, which says that within range of traffic load, Wait deliberately performs better. And at last is the analysis of Wait Mode for traffic load ranging from 1088 to 1536 bytes of packet size, where there are four traffic loads (1152, 1280, 1344, and 1408 bytes) or 50% of this range that activate Wait. It concludes that for this higher load of traffic range, the utilization of device polling delivers high impact. Table 4 illustrates the Cluster Mode utilized by all traffic loads. There are 19 traffic loads (79.17%) utilizing Per Flow cluster, while the rest (5 traffic loads) or (20.83%) use Round Robin cluster. Table 1 tells that Round Robin cluster only applies on traffic load 192, 704, 832, 1408, and 1536 bytes. On the other side, Per Flow cluster applies on majority of traffic loads ranging from small, medium, until high traffic loads. We can make an explanation that Per Flow cluster gives better packet capturing rate in general, compared to Round Robin mode. This is suitable when only one network application takes place, where there is no sharing of packets among multiple applications, therefore the single application will only look on its own buffer, and it will get all parts of a transmission flow without the need to reassemble if parts are separated. For further analysis, Table 1 displays the contents of the selected best chromosome (PF_RING configuration and its firewall rules ordering) for 24 different traffic loads ( bytes). There are 13 rules excluding the default deny rule at the end of the set, which is not included in reordering process. Analysis from the firewall rules ordering column of Table 1, we notice that 14 out of 24 chromosomes (58.33%) put rule no. 13, which has accept action at the front line of the rule set. The chromosomes with this characteristic are for traffic load 64, 256, 384, 448, 512, 576, 704, 768, 896, 1024, 1088, 1152, 1280, and 1344 bytes of each packet size. The traffic loads with this anomaly range from small up to high traffic loads. Thus, we can conclude that our GA approach works well to order or reorder the firewall rules, where the rule set tends to have more rules to accept packets than to drop them, especially when the new administrator is facing existing firewall rules, where new insertions and reordering are highly needed. 64 Copyright c 2013 SERSC
9 At last, we compare the packet capture rates between our method that adds kernel parameters optimization to the firewall rules, against the mere firewall rules without kernel parameters optimization. The results are described in the table below. Table 5. Packet Filtering Rates Comparison between Two Methods Traffic Load Packet Filtering Rate of System with Mere Firewall Rules (bytes/7 sec) Packet Filtering Rate of System with Firewall Rules added with Kernel Parameters Optimization (bytes/7 sec) Increment of Packet Filtering Rate (%) From Table 5, we can refer that the packet rates of the system with kernel parameters optimization are always improved, compared to a system with mere firewall rules without kernel parameters optimization. Overall, our methodology is able to improve the packet capture rates within traffic loads, which range from 64 until 1536 bytes as tested. 5. Conclusions The packet capture kernel parameters optimization and firewall rules reordering, can be accomplished at the same time in one GA optimization framework. Our GAlite program performs the combinatorial process based on the PF_RING kernel parameters and its firewall rules. The results show that the proposed method is suitable for different levels of traffic load, since different traffic load requires particular packet capture setting of kernel parameters. However, the firewall rules ordering does not depend on the size of traffic load. Proper rules ordering maximizes the throughput rate regardless of the size of traffic load. Our framework can assist an administrator to set optimal packet capture configuration when specific network transmission is desired, especially when the traffic input rate can be estimated. 6. Future Work In the future, our framework can be applied in other prospective open source packet capturing module. Thus, it can become a generic packet capture optimization method. Energy measurement can also be added to develop a green packet capturing framework based on the power consumption for specific configuration of packet capture parameters. Acknowledgements This work has been done using the facilities at High Performance Computing (HPC) Service Centre of Universiti Teknologi PETRONAS (UTP). Copyright c 2013 SERSC 65
10 References [1] SonicWALL, SonicOS Enhanced 4.0: Packet Capture, (2012). [2] Wireshark, Packet Capture Purposes, ChapterIntroduction.html#ChIntroPurposes, (2012). [3] L. Deri, Improving Packet Capture: Beyond Device Polling, Proceedings of the th International System Administration and Network Engineering Conference, (2004), pp [4] L. Ricciulli and T. Covel, Inline Snort multiprocessing with PF_RING, Snort Setup Guides, (2011). [5] Suricata, Suricata with PF_RING, Installation_with_PF_RING, (2012). [6] L. Braun, A. Didebulidze, N. Kammenhuber and G. Carle, Comparing and Improving Current Packet Capturing Solutions based on Commodity Hardware, Proceedings of the 10th ACM SIGCOMM conference on Internet measurement, (2010), pp [7] F. Schneider, J. Wallerich and A. Feldmann, Packet capture in 10-gigabit ethernet environments using contemporary commodity hardware, Proceedings of the 8th International Conference on and Network Measurement, (2007). [8] M. Dashtbozorgi and M. A. Azgomi, A high-performance and scalable multi-core aware software solution for network monitoring, The Journal of Supercomputing, vol. 59, no. 2, (2010), pp [9] L. Deri and F. Fusco, Exploiting commodity multi-core systems for network traffic analysis, (2009). [10] G. A. Cascallana and E. M. Lizarrondo, Collecting packet traces at high speed, Proceedings of Workshop on Monitoring, Attack Detection and Mitigation (MonAM) 2006, (2006). [11] J. Mogul and K. K. Ramakrishnan, Eliminating receive livelock in an interrupt-driven kernel, ACM Transactions on Computer Systems, vol. 15, no. 3, (1997), pp. pp [12] I. Kim, J. Moon and H. Y. Yeom, Timer-based interrupt mitigation for high performance packet processing, Proceedings of 5 th Int l Conference on High-Performance Computing in the Asia-Pacific Region, (2001). [13] L. Rizzo, Device Polling Support for FreeBSD, Proceedings of BSDCon Europe Conference, (2001). [14] K. Sastry, D. Goldberg and G. Kendall, in Search Methodologies, Edited E. K. Burke and G. Kendall, Springer US, Los Angeles (2005), pp [15] A. Shrivastava and S. Hardikar, Performance Evaluation of BPNN and Genetic Algorithm, VSRD International Journal of CS & IT, vol. 2, no. 7, (2012), pp [16] E. El-Alfy, A Heuristic Approach for Firewall Policy Optimization, The 9th International Conference on Advanced Communication Technology, vol. 3, (2007), pp [17] A. T. Nottingham and B. Irwin, gpf: A GPU Accelerated Packet Classification Tool, Southern Africa Telecommunication Networks and Applications Conference, (2009). [18] A. Nottingham and B. Irwin, Investigating the Effect of Genetic Algorithms on Filter Optimisation within Fast Packet Classifiers, Proceedings of the ISSA 2009 Conference, (2009), pp [19] A. S. Tongaonkar, Fast Pattern-Matching Techniques for Packet Filtering, Stony Brook Unive. Tech., (2004). [20] J. G. Alfaro, N. Boulahia-Cuppens and F. Cuppens, Complete analysis of configuration rules to guarantee reliable network security policies, Int l Journal of Information Security, vol. 7, no. 2, (2007), pp [21] E. S. Al-Shaer and H. H. Hamed, Discovery of policy anomalies in distributed firewalls, Proceedings of the 23 rd Annual Joint Conf. of the IEEE Comp. and Communications Societies, vol. 4, (2004), pp [22] E. S. Al-Shaer and H. H. Hamed, Design and Implementation of Firewall Policy Advisor Tools, Technical Report CTI-techrep0801, (2002), pp [23] M. Wall, GAlib: A C++ Library of Genetic Algorithm Components, Massachusetts Inst. of Tech., (1997). [24] N. Zakaria, GAlite: A Small C++ GA Library with Just the Minimal Functionality, (2012). [25] NTOP, Why TNAPI (Threaded NAPI)?, (2012). [26] NTOP, PF_RING User Guide, Linux High Speed Packet Capture, (2012). [27] C. Dovrolis, B. Thayer and P. Ramanathan, HIP: Hybrid Interrupt-Polling for the Network Interface, Proceedings of 2001 ACM SIGOPS Operating Systems Review, vol. 35, no. 4, (2001), pp [28] J. Mohr, Linux Hardware Interrupt, &pageid=86, (2012). [29] K. Wehrle, F. Pahlke, H. Ritter, D. Muller and M. Bechler, in The Linux Networking Architecture: Design and Implementation of Network Protocols in the Linux Kernel, Pearson Prentice Hall, New Jersey, (2005), pp Copyright c 2013 SERSC
ncap: Wire-speed Packet Capture and Transmission
ncap: Wire-speed Packet Capture and Transmission L. Deri ntop.org Pisa Italy [email protected] Abstract With the increasing network speed, it is no longer possible to capture and transmit network packets at
Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking
Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking Burjiz Soorty School of Computing and Mathematical Sciences Auckland University of Technology Auckland, New Zealand
Intel DPDK Boosts Server Appliance Performance White Paper
Intel DPDK Boosts Server Appliance Performance Intel DPDK Boosts Server Appliance Performance Introduction As network speeds increase to 40G and above, both in the enterprise and data center, the bottlenecks
Wire-speed Packet Capture and Transmission
Wire-speed Packet Capture and Transmission Luca Deri Packet Capture: Open Issues Monitoring low speed (100 Mbit) networks is already possible using commodity hardware and tools based on libpcap.
Effects of Interrupt Coalescence on Network Measurements
Effects of Interrupt Coalescence on Network Measurements Ravi Prasad, Manish Jain, and Constantinos Dovrolis College of Computing, Georgia Tech., USA ravi,jain,[email protected] Abstract. Several
D1.2 Network Load Balancing
D1. Network Load Balancing Ronald van der Pol, Freek Dijkstra, Igor Idziejczak, and Mark Meijerink SARA Computing and Networking Services, Science Park 11, 9 XG Amsterdam, The Netherlands June [email protected],[email protected],
Gigabit Ethernet Packet Capture. User s Guide
Gigabit Ethernet Packet Capture User s Guide Copyrights Copyright 2008 CACE Technologies, Inc. All rights reserved. This document may not, in whole or part, be: copied; photocopied; reproduced; translated;
Comparing and Improving Current Packet Capturing Solutions based on Commodity Hardware
Comparing and Improving Current Packet Capturing Solutions based on Commodity Hardware Lothar Braun, Alexander Didebulidze, Nils Kammenhuber, Georg Carle Technische Universität München Institute for Informatics
- An Essential Building Block for Stable and Reliable Compute Clusters
Ferdinand Geier ParTec Cluster Competence Center GmbH, V. 1.4, March 2005 Cluster Middleware - An Essential Building Block for Stable and Reliable Compute Clusters Contents: Compute Clusters a Real Alternative
Collecting Packet Traces at High Speed
Collecting Packet Traces at High Speed Gorka Aguirre Cascallana Universidad Pública de Navarra Depto. de Automatica y Computacion 31006 Pamplona, Spain [email protected] Eduardo Magaña Lizarrondo
10 Gbit Hardware Packet Filtering Using Commodity Network Adapters. Luca Deri <[email protected]> Joseph Gasparakis <joseph.gasparakis@intel.
10 Gbit Hardware Packet Filtering Using Commodity Network Adapters Luca Deri Joseph Gasparakis 10 Gbit Monitoring Challenges [1/2] High number of packets to
Performance of Software Switching
Performance of Software Switching Based on papers in IEEE HPSR 2011 and IFIP/ACM Performance 2011 Nuutti Varis, Jukka Manner Department of Communications and Networking (COMNET) Agenda Motivation Performance
Achieving Nanosecond Latency Between Applications with IPC Shared Memory Messaging
Achieving Nanosecond Latency Between Applications with IPC Shared Memory Messaging In some markets and scenarios where competitive advantage is all about speed, speed is measured in micro- and even nano-seconds.
Infrastructure for active and passive measurements at 10Gbps and beyond
Infrastructure for active and passive measurements at 10Gbps and beyond Best Practice Document Produced by UNINETT led working group on network monitoring (UFS 142) Author: Arne Øslebø August 2014 1 TERENA
High-Density Network Flow Monitoring
High-Density Network Flow Monitoring Petr Velan CESNET, z.s.p.o. Zikova 4, 160 00 Praha 6, Czech Republic [email protected] Viktor Puš CESNET, z.s.p.o. Zikova 4, 160 00 Praha 6, Czech Republic [email protected]
Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation
Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation R.Navaneethakrishnan Assistant Professor (SG) Bharathiyar College of Engineering and Technology, Karaikal, India.
The Bus (PCI and PCI-Express)
4 Jan, 2008 The Bus (PCI and PCI-Express) The CPU, memory, disks, and all the other devices in a computer have to be able to communicate and exchange data. The technology that connects them is called the
Monitoring high-speed networks using ntop. Luca Deri <[email protected]>
Monitoring high-speed networks using ntop Luca Deri 1 Project History Started in 1997 as monitoring application for the Univ. of Pisa 1998: First public release v 0.4 (GPL2) 1999-2002:
Performance Evaluation of VMXNET3 Virtual Network Device VMware vsphere 4 build 164009
Performance Study Performance Evaluation of VMXNET3 Virtual Network Device VMware vsphere 4 build 164009 Introduction With more and more mission critical networking intensive workloads being virtualized
Detecting Threats in Network Security by Analyzing Network Packets using Wireshark
1 st International Conference of Recent Trends in Information and Communication Technologies Detecting Threats in Network Security by Analyzing Network Packets using Wireshark Abdulalem Ali *, Arafat Al-Dhaqm,
Exploiting Commodity Multi-core Systems for Network Traffic Analysis
Exploiting Commodity Multi-core Systems for Network Traffic Analysis Luca Deri ntop.org Pisa, Italy [email protected] Francesco Fusco IBM Zurich Research Laboratory Rüschlikon, Switzerland [email protected]
Consolidating Multiple Network Appliances
October 2010 Consolidating Multiple s Space and power are major concerns for enterprises and carriers. There is therefore focus on consolidating the number of physical servers in data centers. Application
DiCAP: Distributed Packet Capturing Architecture for High-Speed Network Links
DiCAP: Distributed Packet Capturing Architecture for High-Speed Network Links Cristian Morariu, Burkhard Stiller Communication Systems Group CSG, Department of Informatics IFI, University of Zürich Binzmühlestrasse
How To Monitor And Test An Ethernet Network On A Computer Or Network Card
3. MONITORING AND TESTING THE ETHERNET NETWORK 3.1 Introduction The following parameters are covered by the Ethernet performance metrics: Latency (delay) the amount of time required for a frame to travel
Next-Generation Firewalls: Critical to SMB Network Security
Next-Generation Firewalls: Critical to SMB Network Security Next-Generation Firewalls provide dramatic improvements in protection versus traditional firewalls, particularly in dealing with today s more
50. DFN Betriebstagung
50. DFN Betriebstagung IPS Serial Clustering in 10GbE Environment Tuukka Helander, Stonesoft Germany GmbH Frank Brüggemann, RWTH Aachen Slide 1 Agenda Introduction Stonesoft clustering Firewall parallel
WHITE PAPER. Enabling 100 Gigabit Ethernet Implementing PCS Lanes
WHITE PAPER Enabling 100 Gigabit Ethernet Implementing PCS Lanes www.ixiacom.com 915-0909-01 Rev. C, January 2014 2 Table of Contents Introduction... 4 The IEEE 802.3 Protocol Stack... 4 PCS Layer Functions...
The Load Balancing System Design of Service Based on IXP2400 Yi Shijun 1, a, Jing Xiaoping 1,b
Advanced Engineering Forum Vol. 1 (2011) pp 42-46 Online: 2011-09-09 (2011) Trans Tech Publications, Switzerland doi:10.4028/www.scientific.net/aef.1.42 The Load Balancing System Design of Service Based
A Passive Method for Estimating End-to-End TCP Packet Loss
A Passive Method for Estimating End-to-End TCP Packet Loss Peter Benko and Andras Veres Traffic Analysis and Network Performance Laboratory, Ericsson Research, Budapest, Hungary {Peter.Benko, Andras.Veres}@eth.ericsson.se
The Performance Analysis of Linux Networking Packet Receiving
The Performance Analysis of Linux Networking Packet Receiving Wenji Wu, Matt Crawford Fermilab CHEP 2006 [email protected], [email protected] Topics Background Problems Linux Packet Receiving Process NIC &
Networking Virtualization Using FPGAs
Networking Virtualization Using FPGAs Russell Tessier, Deepak Unnikrishnan, Dong Yin, and Lixin Gao Reconfigurable Computing Group Department of Electrical and Computer Engineering University of Massachusetts,
Multi-level Metadata Management Scheme for Cloud Storage System
, pp.231-240 http://dx.doi.org/10.14257/ijmue.2014.9.1.22 Multi-level Metadata Management Scheme for Cloud Storage System Jin San Kong 1, Min Ja Kim 2, Wan Yeon Lee 3, Chuck Yoo 2 and Young Woong Ko 1
Application Note. Windows 2000/XP TCP Tuning for High Bandwidth Networks. mguard smart mguard PCI mguard blade
Application Note Windows 2000/XP TCP Tuning for High Bandwidth Networks mguard smart mguard PCI mguard blade mguard industrial mguard delta Innominate Security Technologies AG Albert-Einstein-Str. 14 12489
A Load Balancing Algorithm based on the Variation Trend of Entropy in Homogeneous Cluster
, pp.11-20 http://dx.doi.org/10.14257/ ijgdc.2014.7.2.02 A Load Balancing Algorithm based on the Variation Trend of Entropy in Homogeneous Cluster Kehe Wu 1, Long Chen 2, Shichao Ye 2 and Yi Li 2 1 Beijing
Accelerate In-Line Packet Processing Using Fast Queue
Accelerate In-Line Packet Processing Using Fast Queue Chun-Ying Huang 1, Chi-Ming Chen 1, Shu-Ping Yu 1, Sheng-Yao Hsu 1, and Chih-Hung Lin 1 Department of Computer Science and Engineering, National Taiwan
On Multi Gigabit Packet Capturing With Multi Core Commodity Hardware
On Multi Gigabit Packet Capturing With Multi Core Commodity Hardware Nicola Bonelli, Andrea Di Pietro, Stefano Giordano, and Gregorio Procissi CNIT and Università di Pisa, Pisa, Italy Abstract. Nowadays
Analysis of Open Source Drivers for IEEE 802.11 WLANs
Preprint of an article that appeared in IEEE conference proceeding of ICWCSC 2010 Analysis of Open Source Drivers for IEEE 802.11 WLANs Vipin M AU-KBC Research Centre MIT campus of Anna University Chennai,
WireCAP: a Novel Packet Capture Engine for Commodity NICs in High-speed Networks
WireCAP: a Novel Packet Capture Engine for Commodity NICs in High-speed Networks Wenji Wu, Phil DeMar Fermilab Network Research Group [email protected], [email protected] ACM IMC 2014 November 5-7, 2014 Vancouver,
Efficiently Managing Firewall Conflicting Policies
Efficiently Managing Firewall Conflicting Policies 1 K.Raghavendra swamy, 2 B.Prashant 1 Final M Tech Student, 2 Associate professor, Dept of Computer Science and Engineering 12, Eluru College of Engineeering
Improving Passive Packet Capture: Beyond Device Polling
Improving Passive Packet Capture: Beyond Device Polling Luca Deri NETikos S.p.A. Via Matteucci 34/b 56124 Pisa, Italy Email: [email protected] http://luca.ntop.org/ Abstract Passive packet capture
Configuring Your Computer and Network Adapters for Best Performance
Configuring Your Computer and Network Adapters for Best Performance ebus Universal Pro and User Mode Data Receiver ebus SDK Application Note This application note covers the basic configuration of a network
International Journal of Computer & Organization Trends Volume20 Number1 May 2015
Performance Analysis of Various Guest Operating Systems on Ubuntu 14.04 Prof. (Dr.) Viabhakar Pathak 1, Pramod Kumar Ram 2 1 Computer Science and Engineering, Arya College of Engineering, Jaipur, India.
MIDeA: A Multi-Parallel Intrusion Detection Architecture
MIDeA: A Multi-Parallel Intrusion Detection Architecture Giorgos Vasiliadis, FORTH-ICS, Greece Michalis Polychronakis, Columbia U., USA Sotiris Ioannidis, FORTH-ICS, Greece CCS 2011, 19 October 2011 Network
Unifying Information Security
Unifying Information Security CLEARSWIFT SECURE Gateways VMware Deployment Guide Version 3.3 1 Introduction The Clearswift SECURE Web and Email Gateways are multi-process, multi-threaded applications,
Scalability and Classifications
Scalability and Classifications 1 Types of Parallel Computers MIMD and SIMD classifications shared and distributed memory multicomputers distributed shared memory computers 2 Network Topologies static
Game changing Technology für Ihre Kunden. Thomas Bürgis System Engineering Manager CEE
Game changing Technology für Ihre Kunden Thomas Bürgis System Engineering Manager CEE Threats have evolved traditional firewalls & IPS have not Protection centered around ports & protocols Expensive to
Linux Driver Devices. Why, When, Which, How?
Bertrand Mermet Sylvain Ract Linux Driver Devices. Why, When, Which, How? Since its creation in the early 1990 s Linux has been installed on millions of computers or embedded systems. These systems may
Network Simulation Traffic, Paths and Impairment
Network Simulation Traffic, Paths and Impairment Summary Network simulation software and hardware appliances can emulate networks and network hardware. Wide Area Network (WAN) emulation, by simulating
Network Performance Evaluation of Latest Windows Operating Systems
Network Performance Evaluation of Latest dows Operating Systems Josip Balen, Goran Martinovic, Zeljko Hocenski Faculty of Electrical Engineering Josip Juraj Strossmayer University of Osijek Osijek, Croatia
Improving Passive Packet Capture: Beyond Device Polling
Improving Passive Packet Capture: Beyond Device Polling Luca Deri NETikos S.p.A. Via del Brennero Km 4, Loc. La Figuretta 56123 Pisa, Italy Email: [email protected] http://luca.ntop.org/ Abstract Passive
How to Build a Massively Scalable Next-Generation Firewall
How to Build a Massively Scalable Next-Generation Firewall Seven measures of scalability, and how to use them to evaluate NGFWs Scalable is not just big or fast. When it comes to advanced technologies
Virtualization: TCP/IP Performance Management in a Virtualized Environment Orlando Share Session 9308
Virtualization: TCP/IP Performance Management in a Virtualized Environment Orlando Share Session 9308 Laura Knapp WW Business Consultant [email protected] Applied Expert Systems, Inc. 2011 1 Background
High Performance Data-Transfers in Grid Environment using GridFTP over InfiniBand
High Performance Data-Transfers in Grid Environment using GridFTP over InfiniBand Hari Subramoni *, Ping Lai *, Raj Kettimuthu **, Dhabaleswar. K. (DK) Panda * * Computer Science and Engineering Department
10G Ethernet: The Foundation for Low-Latency, Real-Time Financial Services Applications and Other, Future Cloud Applications
10G Ethernet: The Foundation for Low-Latency, Real-Time Financial Services Applications and Other, Future Cloud Applications Testing conducted by Solarflare Communications and Arista Networks shows that
TCP/IP Jumbo Frames Network Performance Evaluation on A Testbed Infrastructure
I.J. Wireless and Microwave Technologies, 2012, 6, 29-36 Published Online December 2012 in MECS (http://www.mecs-press.net) DOI: 10.5815/ijwmt.2012.06.05 Available online at http://www.mecs-press.net/ijwmt
Improving DNS performance using Stateless TCP in FreeBSD 9
Improving DNS performance using Stateless TCP in FreeBSD 9 David Hayes, Mattia Rossi, Grenville Armitage Centre for Advanced Internet Architectures, Technical Report 101022A Swinburne University of Technology
VON/K: A Fast Virtual Overlay Network Embedded in KVM Hypervisor for High Performance Computing
Journal of Information & Computational Science 9: 5 (2012) 1273 1280 Available at http://www.joics.com VON/K: A Fast Virtual Overlay Network Embedded in KVM Hypervisor for High Performance Computing Yuan
Packet-based Network Traffic Monitoring and Analysis with GPUs
Packet-based Network Traffic Monitoring and Analysis with GPUs Wenji Wu, Phil DeMar [email protected], [email protected] GPU Technology Conference 2014 March 24-27, 2014 SAN JOSE, CALIFORNIA Background Main
Development of Software Dispatcher Based. for Heterogeneous. Cluster Based Web Systems
ISSN: 0974-3308, VO L. 5, NO. 2, DECEMBER 2012 @ SRIMC A 105 Development of Software Dispatcher Based B Load Balancing AlgorithmsA for Heterogeneous Cluster Based Web Systems S Prof. Gautam J. Kamani,
A SURVEY ON GENETIC ALGORITHM FOR INTRUSION DETECTION SYSTEM
A SURVEY ON GENETIC ALGORITHM FOR INTRUSION DETECTION SYSTEM MS. DIMPI K PATEL Department of Computer Science and Engineering, Hasmukh Goswami college of Engineering, Ahmedabad, Gujarat ABSTRACT The Internet
COUNTERSNIPE WWW.COUNTERSNIPE.COM
COUNTERSNIPE WWW.COUNTERSNIPE.COM COUNTERSNIPE SYSTEMS LLC RELEASE 7.0 CounterSnipe s version 7.0 is their next major release and includes a completely new IDS/IPS leveraging high performance scalability
Hardware Acceleration for High-density Datacenter Monitoring
Hardware Acceleration for High-density Datacenter Monitoring Datacenter IaaS Workshop 2014 Denis Matoušek [email protected] Company Introduction Czech university spin-off company Tight cooperation with
Hadoop Technology for Flow Analysis of the Internet Traffic
Hadoop Technology for Flow Analysis of the Internet Traffic Rakshitha Kiran P PG Scholar, Dept. of C.S, Shree Devi Institute of Technology, Mangalore, Karnataka, India ABSTRACT: Flow analysis of the internet
Quantifying TCP Performance for IPv6 in Linux- Based Server Operating Systems
Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT), November Edition, 2013 Volume 3, Issue 11 Quantifying TCP Performance for IPv6
OKTOBER 2010 CONSOLIDATING MULTIPLE NETWORK APPLIANCES
OKTOBER 2010 CONSOLIDATING MULTIPLE NETWORK APPLIANCES It is possible to consolidate multiple network appliances into a single server using intelligent flow distribution, data sharing and virtualization
AIX NFS Client Performance Improvements for Databases on NAS
AIX NFS Client Performance Improvements for Databases on NAS October 20, 2005 Sanjay Gulabani Sr. Performance Engineer Network Appliance, Inc. [email protected] Diane Flemming Advisory Software Engineer
OpenFlow Based Load Balancing
OpenFlow Based Load Balancing Hardeep Uppal and Dane Brandon University of Washington CSE561: Networking Project Report Abstract: In today s high-traffic internet, it is often desirable to have multiple
Achieve Deeper Network Security
Achieve Deeper Network Security Dell Next-Generation Firewalls Abstract Next-generation firewalls (NGFWs) have taken the world by storm, revolutionizing network security as we once knew it. Yet in order
Stream Processing on GPUs Using Distributed Multimedia Middleware
Stream Processing on GPUs Using Distributed Multimedia Middleware Michael Repplinger 1,2, and Philipp Slusallek 1,2 1 Computer Graphics Lab, Saarland University, Saarbrücken, Germany 2 German Research
Performance of Host Identity Protocol on Nokia Internet Tablet
Performance of Host Identity Protocol on Nokia Internet Tablet Andrey Khurri Helsinki Institute for Information Technology HIP Research Group IETF 68 Prague March 23, 2007
Performance Evaluation of Linux Bridge
Performance Evaluation of Linux Bridge James T. Yu School of Computer Science, Telecommunications, and Information System (CTI) DePaul University ABSTRACT This paper studies a unique network feature, Ethernet
Managing Latency in IPS Networks
Application Note Revision B McAfee Network Security Platform Managing Latency in IPS Networks Managing Latency in IPS Networks McAfee Network Security Platform provides you with a set of pre-defined recommended
Performance Modeling and Analysis of a Database Server with Write-Heavy Workload
Performance Modeling and Analysis of a Database Server with Write-Heavy Workload Manfred Dellkrantz, Maria Kihl 2, and Anders Robertsson Department of Automatic Control, Lund University 2 Department of
Packet Capture in 10-Gigabit Ethernet Environments Using Contemporary Commodity Hardware
Packet Capture in 1-Gigabit Ethernet Environments Using Contemporary Commodity Hardware Fabian Schneider Jörg Wallerich Anja Feldmann {fabian,joerg,anja}@net.t-labs.tu-berlin.de Technische Universtität
Low-rate TCP-targeted Denial of Service Attack Defense
Low-rate TCP-targeted Denial of Service Attack Defense Johnny Tsao Petros Efstathopoulos University of California, Los Angeles, Computer Science Department Los Angeles, CA E-mail: {johnny5t, pefstath}@cs.ucla.edu
Informatica Ultra Messaging SMX Shared-Memory Transport
White Paper Informatica Ultra Messaging SMX Shared-Memory Transport Breaking the 100-Nanosecond Latency Barrier with Benchmark-Proven Performance This document contains Confidential, Proprietary and Trade
Can High-Performance Interconnects Benefit Memcached and Hadoop?
Can High-Performance Interconnects Benefit Memcached and Hadoop? D. K. Panda and Sayantan Sur Network-Based Computing Laboratory Department of Computer Science and Engineering The Ohio State University,
High Performance Cluster Support for NLB on Window
High Performance Cluster Support for NLB on Window [1]Arvind Rathi, [2] Kirti, [3] Neelam [1]M.Tech Student, Department of CSE, GITM, Gurgaon Haryana (India) [email protected] [2]Asst. Professor,
SIDN Server Measurements
SIDN Server Measurements Yuri Schaeffer 1, NLnet Labs NLnet Labs document 2010-003 July 19, 2010 1 Introduction For future capacity planning SIDN would like to have an insight on the required resources
On-Premises DDoS Mitigation for the Enterprise
On-Premises DDoS Mitigation for the Enterprise FIRST LINE OF DEFENSE Pocket Guide The Challenge There is no doubt that cyber-attacks are growing in complexity and sophistication. As a result, a need has
An Oracle Technical White Paper November 2011. Oracle Solaris 11 Network Virtualization and Network Resource Management
An Oracle Technical White Paper November 2011 Oracle Solaris 11 Network Virtualization and Network Resource Management Executive Overview... 2 Introduction... 2 Network Virtualization... 2 Network Resource
A way towards Lower Latency and Jitter
A way towards Lower Latency and Jitter Jesse Brandeburg [email protected] Intel Ethernet BIO Jesse Brandeburg A senior Linux developer in the Intel LAN Access Division,
Architecture of distributed network processors: specifics of application in information security systems
Architecture of distributed network processors: specifics of application in information security systems V.Zaborovsky, Politechnical University, Sait-Petersburg, Russia [email protected] 1. Introduction Modern
High-Performance IP Service Node with Layer 4 to 7 Packet Processing Features
UDC 621.395.31:681.3 High-Performance IP Service Node with Layer 4 to 7 Packet Processing Features VTsuneo Katsuyama VAkira Hakata VMasafumi Katoh VAkira Takeyama (Manuscript received February 27, 2001)
High-Density Network Flow Monitoring
Petr Velan [email protected] High-Density Network Flow Monitoring IM2015 12 May 2015, Ottawa Motivation What is high-density flow monitoring? Monitor high traffic in as little rack units as possible
OpenFlow with Intel 82599. Voravit Tanyingyong, Markus Hidell, Peter Sjödin
OpenFlow with Intel 82599 Voravit Tanyingyong, Markus Hidell, Peter Sjödin Outline Background Goal Design Experiment and Evaluation Conclusion OpenFlow SW HW Open up commercial network hardware for experiment
LOAD BALANCING OF USER PROCESSES AMONG VIRTUAL MACHINES IN CLOUD COMPUTING ENVIRONMENT
LOAD BALANCING OF USER PROCESSES AMONG VIRTUAL MACHINES IN CLOUD COMPUTING ENVIRONMENT 1 Neha Singla Sant Longowal Institute of Engineering and Technology, Longowal, Punjab, India Email: 1 [email protected]
COMPARATIVE ANALYSIS OF DIFFERENT QUEUING MECHANISMS IN HETROGENEOUS NETWORKS
COMPARATIVE ANALYSIS OF DIFFERENT QUEUING MECHANISMS IN HETROGENEOUS NETWORKS Shubhangi Rastogi 1, Samir Srivastava 2 M.Tech Student, Computer Science and Engineering, KNIT, Sultanpur, India 1 Associate
Enhance Service Delivery and Accelerate Financial Applications with Consolidated Market Data
White Paper Enhance Service Delivery and Accelerate Financial Applications with Consolidated Market Data What You Will Learn Financial market technology is advancing at a rapid pace. The integration of
Boost Database Performance with the Cisco UCS Storage Accelerator
Boost Database Performance with the Cisco UCS Storage Accelerator Performance Brief February 213 Highlights Industry-leading Performance and Scalability Offloading full or partial database structures to
Chapter 11 I/O Management and Disk Scheduling
Operating Systems: Internals and Design Principles, 6/E William Stallings Chapter 11 I/O Management and Disk Scheduling Dave Bremer Otago Polytechnic, NZ 2008, Prentice Hall I/O Devices Roadmap Organization
Going Linux on Massive Multicore
Embedded Linux Conference Europe 2013 Going Linux on Massive Multicore Marta Rybczyńska 24th October, 2013 Agenda Architecture Linux Port Core Peripherals Debugging Summary and Future Plans 2 Agenda Architecture
Applying Design Patterns in Distributing a Genetic Algorithm Application
Applying Design Patterns in Distributing a Genetic Algorithm Application Nick Burns Mike Bradley Mei-Ling L. Liu California Polytechnic State University Computer Science Department San Luis Obispo, CA
Intel Data Direct I/O Technology (Intel DDIO): A Primer >
Intel Data Direct I/O Technology (Intel DDIO): A Primer > Technical Brief February 2012 Revision 1.0 Legal Statements INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE,
Parallel Firewalls on General-Purpose Graphics Processing Units
Parallel Firewalls on General-Purpose Graphics Processing Units Manoj Singh Gaur and Vijay Laxmi Kamal Chandra Reddy, Ankit Tharwani, Ch.Vamshi Krishna, Lakshminarayanan.V Department of Computer Engineering
EdgeRouter Lite 3-Port Router. Datasheet. Model: ERLite-3. Sophisticated Routing Features. Advanced Security, Monitoring, and Management
EdgeRouter Lite 3-Port Router Model: ERLite-3 Sophisticated Routing Features Advanced Security, Monitoring, and Management High-Performance Gigabit Ports Advanced 3-Port Router Introducing the EdgeRouter
