FPGA Implementation of Network Security System Using Counting Bloom Filter
|
|
|
- Denis Gordon
- 9 years ago
- Views:
Transcription
1 International Journal of Research in Information Technology (IJRIT) ISSN FPGA Implementation of Network Security System Using Counting Bloom Filter Shruti, Harshada J. Patil 1PG Scholar, 2 Assistant Professor Department of VLSI Design and embedded system Vemana IT, Visvesvaraya Technological University, Belgavi, Karnataka, India. [email protected], [email protected] Abstract As we know hackers, viruses and other kind of malware is main problem for the ever increasing threats in computer system which will affect speed and performance of the system. Increment of threats and network speed causes the conventional software based network intrusion detection system must choose between the high data rates and security as well as protection. In order to overcome this, we have designed hardware based network intrusion detection system on chip using counting bloom filter. Here the design consist of extremely high throughput and can detect threats successfully as well as mitigate know threats and here in this project the only known counting bloom filter based network intrusion detection system to be implemented on a FPGA. 1. Introduction Virus, worms, and programmer assaults on systems cost billions of dollars and influence a huge number of clients. Furthermore late prominent assaults on our national security foundation. for example, the penetration of Chinese programmers uncover that protection against system interruption is presently a matter of money related and is very critical for the national security. It is inaccurate to accept that every client or individual machine on a system is secure. This is because of the extensive number of machines that need to be secured, each of which obliges time, experts in technical field and consistent cautiousness to guarantee assurance against the most recent threats. Without using the IC s fabrication here moving for the FPGA that is field programmable gate array because they are reconfigurable chips which will have the programmable logic and perform multiple operations and complex operation in parallel and it has become most flexible platform for the hardware based network intrusion detection. Thus hardware network intrusion providing many features such as real time protection against the wide various array of threats with maximum throughput. Here we are using most efficient data structure bloom filter which provide highest maximum possible throughput and efficient data structure for the hardware based pattern matching. In this randomized representation of threat database are used for storage purpose and as well as allowing for a various advantage over the hash table which provide the large quantity of overhead and there will consist of enough memory to store the entire threat database. Counting bloom filter is Shruti, IJRIT-442
2 improved version of the bloom filter which will provide more flexibility than the basic bloom filter. In this undertaking, we display the initially advanced, counting bloom-filter-based Network Intrusion Detection actualized on a FPGA: our outline is immeasurable through further parallel operation and, as far as anyone is concerned, is one of the most elevated throughput hardware based network intrusion detection system in presence. Initially we will consider the probabilistic arithmetic which are the premise of Bloom Filters, and the advancement of Bloom Filters is nothing but Counting Bloom Filters. Scope: This project provides maximum throughput and high speed network intrusion detection. The software based network was initially used but it has many drawbacks such as it will consume more memory space and it will required many lookup tables and provide less throughput in this we have to choose between the speed of data rates and security of the network. Thus the hardware based network intrusion detection came into existence which will use the hash tables it is kind of counter which will count each bit with stored data randomly then it will allow the network to computer. It provides high speed data rates and maximum throughput and it will consume less memory thus less lookup tables. In order to provide efficient operation we are selecting bloom filter for hardware based network intrusion detection system. 1.1 Object : It introduces the bloom filter and counting bloom filter which basically provides the efficient performance and maximum high throughput. The boom filter is nothing but the advanced method of hash tables which will provide high throughput. In order make the bloom filter much better with more flexibility the counting bloom filter came into existence. It will help us to maintain the information with more security and it will avoid the viruses, hacking and other malware. There will be no necessary of choosing option between the speed and security. The important object of this project is that using hardware based network intrusion detection we will detect the virus or hacking before it enters the system which will provide more efficient performance and higher throughput as well as flexibility. Thus it will consider many features such as performance with high speed data rates and high throughput. There will be overcome of the many drawbacks like large usage of memory and as well as the time consuming operations. Here the network intrusion detection will test it with the real world threats and as well as the present performance benchmarks. Finally the main object of using bloom filter is that it will provide the low hardware complexity and high accuracy operation with high throughput. 1.2 Motivation : As we know, now days virus, hacking and malware attacks on network creates lots of loss to the every field in one or other way. Thus the network intrusion detection is the matter of financial as well as security of each and every network. Initially software based network intrusion detection was invented by the Cisco which will provide less throughput with more memory for lookup table which creates many complication in performance so, thus there will be motivation of the hardware based network intrusion detection is introduced in order to get well secured information and as well as the high throughput performance. 1.3 Outcome of The Project: provide maximum high throughput Shruti, IJRIT-443
3 less hardware complexity more efficient high speed fully secured network intrusion detection 1.5 Development Specification: Platform : Language: windows VERILOG and VHDL Simulator: Xilinx ISE 13.4 FPGA devices: vertex 5 FPGA 1. BACKGROUND 2.1 Hash function: A lightweight intrusion detection system will eas-ily be deployed on most any node of a network, with nominal disruption to operations. light-weight ID' ought to be cross-platform, have atiny low system foot-print, and be simply organized by system administrators United Nations agency ought to implement a particular security solution during a short quantity of your time. they\'ll be any set of package tools which may be assembled and place into action in response to evolving security things. light-weight IDS\' area unit little, powerful, and versatile enough to be used as permanent parts of the net-work security infrastructure. A hash table is one in every of the foremost engaging decisions for fast operations which needs O(1) average memory accesses per lookup. Indeed, as a result of its versatile relevance in network packet pro-cessing, a number of the fashionable network processors give a inbuilt hashing unit. A survey of some recent analysis literature on network packet process reveals that hash tables are rife in several applications together with per-flow state management, science operation and packet classification. These modules are generally parts within the data-path of a high-speed router. Hence, they need to be ready to method packets at line speed that makes it imperative for the underlying hash tables to deliver a decent operation performance. Following could be a short discussion on however varied algorithms and applications use hash tables and why their search performance is vital. Maintaining Per-flow Context: one among the foremost vital ap-plications of hash tables in network process is within the context of maintaining association records or per-flow states. Per-flow state is beneficial in providing QoS to flows, measurements, watching and payload analysis in Intrusion Detection Systems (IDS).For instance, a hash table of association records for communications protocol connections. A record is made and accessed by computing a recap the 5-tuple of the TCP/IP header. This record could contain the mandatory con-nection state that is updated upon the arrival of every Shruti, IJRIT-444
4 packet thereon association. Efforts ar beneath thanks to implement such IDS in hardware for line speed packet process. In these im-plementations, association records ar maintained in DRAM Related work: A hash table operation involves hash computation followed by storage memory accesses. Whereas memory accesses because of collisions is moderately reduced by exploitation refined cryptanalytic hash functions like MD5 or SHA-1, these ar troublesome to calculate quickly. within the context of high-speed packet process devices, even with specialised hardware, such hash functions will take many clock cycles to supply the output. for example, a number of the present hardware implementations of the hash cores consume quite sixty four clock cycles,, that exceeds the budget of minimum packet time. Moreover, the performance of such hash functions is not any higher than the theoretical performance with the belief of uniform random hashing. Another avenue to enhance the hash table performance would be to t plot an ideal hash perform supported the things to be hashed. 2.3 Fast hashing: For the aim of clarity, we tend to develop our algorithmic rule and hash table design incrementally ranging from a naive hash table (NHT). we tend to think about the hash table algorithmic rule during which the collisions area unit resolved by chaining since it\'s higher performance than open addressing schemes and is one in all the foremost common strategies. An NHT consists of the array of buckets with every bucket inform to the list of things hashed into it. we tend to denote by the set of things to be inserted within the table. Further, let be the list of things hashed to bucket and the item during this list. Thus, X i = {X i 1, X i 2, X i 3...X i ai} X = U L i=1 X i where a i is the total number of items in the bucket i and L is the total number of lists present in the table. In the Figure 1, x 3 =z, x 8 =w, a 3 = 2 and L=3. Fig 2.1: Naive Hash table Shruti, IJRIT-445
5 2.4 Basic Fast Hash Table: We currently consider our fast Hash Table algorithmic rule. 1st we have a tendency to consider the fundamental type of our algorithmic rule that we have a tendency to decision Basic quick Hash Table (BFHT) so we have a tendency to improve upon it. We begin with the outline of Bloom filter that is at the core of our algorithms. A Bloom filter could be a hash-based arrangement to store a collection of things succinctly. It computes k hash functions on every item, every of that returns associate degree address of slightly in an exceedingly the bit map of length m. All the k bits chosen by the hash values within the bit map area unit set to 1. By doing this, the filter primarily programs the ikon with a signature of the item. By repetition a similar procedure for all input things, Bloom filter are often programmed to contain the outline of all the things. This filter are often queried to visualize if a given item is programmed in it. 3. DESIGN METHODOLOGY 3.1Counting Bloom filter: The main drawback of bloom filter is that once the element has been programmed into the array, it cannot be deleted without erasing and reprogramming the filter from scratch. This is because there is no way to reset the bits corresponding to one element to ZERO and ensure that none of those bits were needed by another element still in the Bloom Filter. To address this deficiency, Bloom Filters have been adapted into Counting Bloom Filters (CBFs). Fig 4.1. A Counting Bloom filter with 4-bit up/down counter A CBF is identical to a standard Bloom Filter in concept, but differs in implementation: the Bloom array for a CBF consists of counters and not individual bits (Fig. 4.1). By using counters for a CBF, you can add and remove items from the CBF. Instead of setting a bit when programming it, you increment (+1) the corresponding counters; when deleting an item you decrement ( 1) the corresponding counters. To query the CBF for the existence of some piece of data, you check if all the corresponding counters in the Bloom array are non-zero (like checking if all corresponding bits are set to ONEs in a standard Bloom Filter). 1.2 Designing Counting Bloom Filters Since each counter in the CBF array has a limited size, some new challenges are introduced, such as what to do if a counter overflows because too many elements are added. Empirically, a reasonable counter size that minimizes overflows for most applications is four bits. Regardless of the counter size, there is always the Shruti, IJRIT-446
6 possibility that you reach the maximum value of a counter and an overflow occurs: in this situation it is best to leave the counter at its maximum value. While this could potentially cause a false negative (which is impossible with standard Bloom Filters), if the deletions from the CBF are more-or-less random (as is the case with real-world data), and the counter is of a reasonable size (i.e. 4 bits), the average time until a false negative occurs is extremely large. We used CBFs for our network intrusion detection as they allow for dynamic re-programming (add/delete) of the filter. This flexibility is highly desirable to ensure that the filter is up to date, e.g. if a new worm outbreak occurs (add), or if an attack is no longer a threat because the affected software was patched (delete), etc. The CBFs drawbacks are outweighed by their advantages, the abundant resources on the FPGA (mitigating the memory requirement), and the very low probability of a false negative.the Field Programmable Gate Array is made up of 4-bit or 6-bit Look-Up Tables (LUTs) which can be programmed to compute any Boolean function of 4 or 6 inputs, respectively. 3.3 Hardware implementation: Before moving on to Network Intrusion Detection, we first designed, optimized and implemented the necessary Bloom Filters on the FPGA. We have implemented three Bloom Filters in both standard and Counting variants on the Xilinx Virtex-5 FPGA hosted on the ML403 development board. The FPGA consists of 5,472 slices (a slice contains two LUTs), 36 block RAMs (of 18-kbits each), and an embedded PowerPC 405 processor. The embedded processor eliminates the need for a separate computer to perform control functions such as TCP/IP network communication, making intelligent decisions in the NID threat detection process, etc; this enabled us to make this a system-on-a-chip. 3.4 Standard Bloom Filter Implementation: The Bloom array (m = bits) is keep in Block RAM on the FPGA. to maximise output and minimize the management and routing logic, we have a tendency to provide every hash perform exclusive access to the block RAM via a dedicated I/O port. we have a tendency to succeed this as follows: since every this block RAM has 2 I/O ports (i.e., you\'ll perform 2 freelance reads/writes to completely different addresses per clock cycle), and that we have k = eight hashes, we have a tendency to split the bit array across k/2 = four block RAMs that contain m/4 = 16384/4 =4096 bits every. However every hash perform must be changed thus its output falls inside the vary of its exclusive block RAM, this doesn\'t effects the false positive rate or the effectiveness of the Bloom Filter. An gate is employed to perform the ultimate membership check. 3.5 Counting Bloom Filter Implementation: As delineate in section III, going from a customary Bloom Filter to a investigating Bloom Filter design simply involves modifying the Bloom array in order that every bit may be a 4-bit counter instead. we have the tendency to enforced our Counting bloom filter by storing the counter values in block RAM; every block RAM includes a capability of 18-kbits. The RAM was used at the 4-bit depth, and 4-bit adders were enclosed to increment or decrement the RAM counters whereas comparators were wont to check if the counters were set (i.e., its worth was larger than zero). Mistreatment the LUTs because the counters was thought-about (as a counter may be a 4-bit Boolean function) however rejected due to an insufficient range of LUTs on the FPGA and therefore the large routing overhead which might have well reduced performance.the input data Ethernet packets (frames) is fed to the preprocessor that extracts the information processing packet, baring the headers Shruti, IJRIT-447
7 and forwarding the host info to the PowerPC and also the TCP/UDP payload to the investigating Bloom Filters. The filters take 2-, 4- and 8-byte knowledge inputs respectively; this {can be} as a result of the threat patterns (such as ILOVEYOU for the Love Bug worm) can be of variable size; the preprocessor should be used to stay track of patterns longer than 8-bytes we haven\'t enforced this capability nevertheless. Fig A simplified block diagram of our NID design. A flow chart showing however our Network intrusion detection device operates is shown in Fig. 5. whenever the Counting bloom filter, perform operation with the super fast processor is need to investigate about the output of the Counting bloom filters and select if a threat is detected. without considering this to a separate chip(for example as is finished in some industrial Network intrusion detection systems) we have a tendency to set to style the Network intrusion detection device as a whole system-on-chip by exploitation to the embedded system processor. when the network intrusion system detects a threat from the Counting bloom filter outputs, it will eliminates the functions which are similar of a false positive by confirmative, that is present within the hash table (stored in DDR RAM). Note that this addition of bloom filter and small secondary hash table approach is much quicker and as well as uses less memory than a full hash-table approach. Fig 5. Flowchart of Network Intrusion Detection using CBFs on an FPGA Shruti, IJRIT-448
8 If the threat is confirmed, the Network intrusion detection device drops the info packet and sends a web management Message Protocol (ICMP) datagram of sort DESTINATION unreached with rationalization code Host administratively prohibited to the supply of the malicious packet. where the UDP packet in the system is shipped to facility wherever the computer system user will more analyze the alerts. The NID device may also take a lot of forceful steps like information processing obstruction of known/persistent hosts to avoid denial of service attacks on the network intrusion detection device. Advantages: High throughput Less memory consuming High speed High network intrusion detection system Applications: Collaborating in overlay and peer-to-peer networks: Bloom filters can be used for summarizing content to aid collaborations in overlay and peer-to-peer networks Resource routing: Bloom filters allow probabilistic algorithms for locating resources. Packet routing Bloom filters provide a means to speed up or simplify packet routing protocols Measurements: Bloom filter provide a useful tool for measurement infrastructures used to create data summaries in routers or other network devices. 2. Performance Analysis And Results 4.1 Output of counting bloom filter: Shruti, IJRIT-449
9 4.2 Output of hash function: 4.3 Output of bloom filter: Shruti, IJRIT-450
10 4.5 Output of the project: CONCLUSION We presented a single-chip, FPGA-based hardware Network Intrusion Detection (NID) system using Counting Bloom Filters. Our design identifies and can neutralize threats such as hackers and viruses at the network boundary before they can attack end-user computers. As network data rates increase, such real-time preemptive action may prove impractical for software NID solutions. Counting Bloom Filters are efficient, randomized data structures that are much faster and use less memory than the hash tables usually used in software applications. Consequently, our NID device has a throughput of 3.5 Gbps over an order of magnitude higher than commercial software-based NID systems. Future work includes increasing the number and variety of threat-signatures that the system can detect as well as full scale testing on a live network. We hope that by increasing the flexibility and speed of effective Network Intrusion Detection we can help secure computers against malicious attacks, reduce associated financial losses and prevent the compromise of national security. Shruti, IJRIT-451
11 References [1] R. Lemos, Counting the cost of slammer, CNet, Feb [2] J. W. Lockwood, J. Moscola, M. Kulig, D. Reddick, and T. Brooks, Internet worm and virus protection in dynamically reconfigurable hardware, in Proc. of Mil. and Aero. Programmable Logic Device (MAPLD), Sep [3] J. Swartz, Chinese hackers seek U.S. access, USA Today, Mar [4] B. Achoido and M. Kessler, Worm, virus threat grows, USA Today, Apr [5] Installing Cisco intrusion prevention system appliances and modules 5.1, Cisco. Shruti, IJRIT-452
Exploiting Stateful Inspection of Network Security in Reconfigurable Hardware
Exploiting Stateful Inspection of Network Security in Reconfigurable Hardware Shaomeng Li, Jim Tørresen, Oddvar Søråsen Department of Informatics University of Oslo N-0316 Oslo, Norway {shaomenl, jimtoer,
UNITE: Uniform hardware-based Network Intrusion detection Engine
UNITE: Uniform hardware-based Network Intrusion detection Engine S. Yusuf and W. Luk and M. K. N. Szeto and W. Osborne Department of Computing, Imperial College London, 180 Queen s Gate, London SW7 2BZ
A Fast Pattern-Matching Algorithm for Network Intrusion Detection System
A Fast Pattern-Matching Algorithm for Network Intrusion Detection System Jung-Sik Sung 1, Seok-Min Kang 2, Taeck-Geun Kwon 2 1 ETRI, 161 Gajeong-dong, Yuseong-gu, Daejeon, 305-700, Korea [email protected]
Open Flow Controller and Switch Datasheet
Open Flow Controller and Switch Datasheet California State University Chico Alan Braithwaite Spring 2013 Block Diagram Figure 1. High Level Block Diagram The project will consist of a network development
Firewalls Overview and Best Practices. White Paper
Firewalls Overview and Best Practices White Paper Copyright Decipher Information Systems, 2005. All rights reserved. The information in this publication is furnished for information use only, does not
co Characterizing and Tracing Packet Floods Using Cisco R
co Characterizing and Tracing Packet Floods Using Cisco R Table of Contents Characterizing and Tracing Packet Floods Using Cisco Routers...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1
How To Protect Your Network From Intrusions From A Malicious Computer (Malware) With A Microsoft Network Security Platform)
McAfee Security: Intrusion Prevention System REV: 0.1.1 (July 2011) 1 Contents 1. McAfee Network Security Platform...3 2. McAfee Host Intrusion Prevention for Server...4 2.1 Network IPS...4 2.2 Workload
IMPLEMENTATION OF FPGA CARD IN CONTENT FILTERING SOLUTIONS FOR SECURING COMPUTER NETWORKS. Received May 2010; accepted July 2010
ICIC Express Letters Part B: Applications ICIC International c 2010 ISSN 2185-2766 Volume 1, Number 1, September 2010 pp. 71 76 IMPLEMENTATION OF FPGA CARD IN CONTENT FILTERING SOLUTIONS FOR SECURING COMPUTER
BITWISE OPTIMISED CAM FOR NETWORK INTRUSION DETECTION SYSTEMS. Sherif Yusuf and Wayne Luk
BITWISE OPTIMISED CAM FOR NETWORK INTRUSION DETECTION SYSTEMS Sherif Yusuf and Wayne Luk Department of Computing, Imperial College London, 180 Queen s Gate, London SW7 2BZ email: {sherif.yusuf, w.luk}@imperial.ac.uk
Extensible Network Configuration and Communication Framework
Extensible Network Configuration and Communication Framework Todd Sproull and John Lockwood Applied Research Laboratory Department of Computer Science and Engineering: Washington University in Saint Louis
ΕΠΛ 674: Εργαστήριο 5 Firewalls
ΕΠΛ 674: Εργαστήριο 5 Firewalls Παύλος Αντωνίου Εαρινό Εξάμηνο 2011 Department of Computer Science Firewalls A firewall is hardware, software, or a combination of both that is used to prevent unauthorized
Networking Virtualization Using FPGAs
Networking Virtualization Using FPGAs Russell Tessier, Deepak Unnikrishnan, Dong Yin, and Lixin Gao Reconfigurable Computing Group Department of Electrical and Computer Engineering University of Massachusetts,
18-731 Midterm. Name: Andrew user id:
18-731 Midterm 6 March 2008 Name: Andrew user id: Scores: Problem 0 (10 points): Problem 1 (10 points): Problem 2 (15 points): Problem 3 (10 points): Problem 4 (20 points): Problem 5 (10 points): Problem
NetFlow probe on NetFPGA
Verze #1.00, 2008-12-12 NetFlow probe on NetFPGA Introduction With ever-growing volume of data being transferred over the Internet, the need for reliable monitoring becomes more urgent. Monitoring devices
CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013
CS 356 Lecture 17 and 18 Intrusion Detection Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
SPACK FIREWALL RESTRICTION WITH SECURITY IN CLOUD OVER THE VIRTUAL ENVIRONMENT
SPACK FIREWALL RESTRICTION WITH SECURITY IN CLOUD OVER THE VIRTUAL ENVIRONMENT V. Devi PG Scholar, Department of CSE, Indira Institute of Engineering & Technology, India. J. Chenni Kumaran Associate Professor,
Hardware Components in Cybersecurity Education
Hardware Components in Cybersecurity Education Dan Chia-Tien Lo 1, Max North 2, Sarah North 3 1 Department of Computer Science and Software Engineering Southern Polytechnic State University 2 Department
CYBER ATTACKS EXPLAINED: PACKET CRAFTING
CYBER ATTACKS EXPLAINED: PACKET CRAFTING Protect your FOSS-based IT infrastructure from packet crafting by learning more about it. In the previous articles in this series, we explored common infrastructure
OpenFlow Based Load Balancing
OpenFlow Based Load Balancing Hardeep Uppal and Dane Brandon University of Washington CSE561: Networking Project Report Abstract: In today s high-traffic internet, it is often desirable to have multiple
ΕΠΛ 475: Εργαστήριο 9 Firewalls Τοίχοι πυρασφάλειας. University of Cyprus Department of Computer Science
ΕΠΛ 475: Εργαστήριο 9 Firewalls Τοίχοι πυρασφάλειας Department of Computer Science Firewalls A firewall is hardware, software, or a combination of both that is used to prevent unauthorized Internet users
Security vulnerabilities in the Internet and possible solutions
Security vulnerabilities in the Internet and possible solutions 1. Introduction The foundation of today's Internet is the TCP/IP protocol suite. Since the time when these specifications were finished in
LogiCORE IP AXI Performance Monitor v2.00.a
LogiCORE IP AXI Performance Monitor v2.00.a Product Guide Table of Contents IP Facts Chapter 1: Overview Target Technology................................................................. 9 Applications......................................................................
Architecture of distributed network processors: specifics of application in information security systems
Architecture of distributed network processors: specifics of application in information security systems V.Zaborovsky, Politechnical University, Sait-Petersburg, Russia [email protected] 1. Introduction Modern
Network Security Algorithms
Network Security Algorithms Thomas Zink University of Konstanz [email protected] Abstract. Viruses, Worms and Trojan Horses, the malware zoo is growing every day. Hackers and Crackers try to
IBM Proventia Network Intrusion Prevention System With Crossbeam X80 Platform
IBM Proventia Network Intrusion Prevention System With Crossbeam X80 Platform September 2008 pg. 1 Executive Summary The objective of this report is to provide performance guidance for IBM s Proventia
Dual Mechanism to Detect DDOS Attack Priyanka Dembla, Chander Diwaker 2 1 Research Scholar, 2 Assistant Professor
International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) International Journal of Engineering, Business and Enterprise
A Fuzzy Logic-Based Information Security Management for Software-Defined Networks
A Fuzzy Logic-Based Information Security Management for Software-Defined Networks Sergei Dotcenko *, Andrei Vladyko *, Ivan Letenko * * The Bonch-Bruevich Saint-Petersburg State University of Telecommunications,
FPGA Implementation of IP Packet Segmentation and Reassembly in Internet Router*
SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 6, No. 3, December 2009, 399-407 UDK: 004.738.5.057.4 FPGA Implementation of IP Packet Segmentation and Reassembly in Internet Router* Marko Carević 1,a,
An apparatus for P2P classification in Netflow traces
An apparatus for P2P classification in Netflow traces Andrew M Gossett, Ioannis Papapanagiotou and Michael Devetsikiotis Electrical and Computer Engineering, North Carolina State University, Raleigh, USA
Cisco Integrated Services Routers Performance Overview
Integrated Services Routers Performance Overview What You Will Learn The Integrated Services Routers Generation 2 (ISR G2) provide a robust platform for delivering WAN services, unified communications,
Configurable String Matching Hardware for Speeding up Intrusion Detection. Monther Aldwairi*, Thomas Conte, Paul Franzon
Configurable String Matching Hardware for Speeding up Intrusion Detection Monther Aldwairi*, Thomas Conte, Paul Franzon Department of Electrical and Computer Engineering, North Carolina State University,
Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶
Network Security 網 路 安 全 Lecture 1 February 20, 2012 洪 國 寶 1 Outline Course information Motivation Introduction to security Basic network concepts Network security models Outline of the course 2 Course
FPGA. AT6000 FPGAs. Application Note AT6000 FPGAs. 3x3 Convolver with Run-Time Reconfigurable Vector Multiplier in Atmel AT6000 FPGAs.
3x3 Convolver with Run-Time Reconfigurable Vector Multiplier in Atmel AT6000 s Introduction Convolution is one of the basic and most common operations in both analog and digital domain signal processing.
Design and Implementation of an On-Chip timing based Permutation Network for Multiprocessor system on Chip
Design and Implementation of an On-Chip timing based Permutation Network for Multiprocessor system on Chip Ms Lavanya Thunuguntla 1, Saritha Sapa 2 1 Associate Professor, Department of ECE, HITAM, Telangana
DRAFT 18-09-2003. 2.1 Gigabit network intrusion detection systems
An Intrusion Detection System for Gigabit Networks (Working paper: describing ongoing work) Gerald Tripp Computing Laboratory, University of Kent. CT2 7NF. UK e-mail: [email protected] This draft
Per-Flow Queuing Allot's Approach to Bandwidth Management
White Paper Per-Flow Queuing Allot's Approach to Bandwidth Management Allot Communications, July 2006. All Rights Reserved. Table of Contents Executive Overview... 3 Understanding TCP/IP... 4 What is Bandwidth
Chapter 3. TCP/IP Networks. 3.1 Internet Protocol version 4 (IPv4)
Chapter 3 TCP/IP Networks 3.1 Internet Protocol version 4 (IPv4) Internet Protocol version 4 is the fourth iteration of the Internet Protocol (IP) and it is the first version of the protocol to be widely
Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking
Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking Burjiz Soorty School of Computing and Mathematical Sciences Auckland University of Technology Auckland, New Zealand
19. Exercise: CERT participation in incident handling related to the Article 13a obligations
CERT Exercises Handbook 223 223 19. Exercise: CERT participation in incident handling related to the Article 13a obligations Main Objective Targeted Audience Total Duration This exercise provides students
Network Based Intrusion Detection Using Honey pot Deception
Network Based Intrusion Detection Using Honey pot Deception Dr.K.V.Kulhalli, S.R.Khot Department of Electronics and Communication Engineering D.Y.Patil College of Engg.& technology, Kolhapur,Maharashtra,India.
Banking Security using Honeypot
Banking Security using Honeypot Sandeep Chaware D.J.Sanghvi College of Engineering, Mumbai [email protected] Abstract New threats are constantly emerging to the security of organization s information
IPv6 SECURITY. May 2011. The Government of the Hong Kong Special Administrative Region
IPv6 SECURITY May 2011 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without the express
UVOIP: CROSS-LAYER OPTIMIZATION OF BUFFER OPERATIONS FOR PROVIDING SECURE VOIP SERVICES ON CONSTRAINED EMBEDDED DEVICES
UVOIP: CROSS-LAYER OPTIMIZATION OF BUFFER OPERATIONS FOR PROVIDING SECURE VOIP SERVICES ON CONSTRAINED EMBEDDED DEVICES Dinil.D 1, Aravind.P.A 1, Thothadri Rajesh 1, Aravind.P 1, Anand.R 1, Jayaraj Poroor
Hierarchical Bloom Filters: Accelerating Flow Queries and Analysis
Hierarchical Bloom Filters: Accelerating Flow Queries and Analysis January 8, 2008 FloCon 2008 Chris Roblee, P. O. Box 808, Livermore, CA 94551 This work performed under the auspices of the U.S. Department
Chapter 9 Firewalls and Intrusion Prevention Systems
Chapter 9 Firewalls and Intrusion Prevention Systems connectivity is essential However it creates a threat Effective means of protecting LANs Inserted between the premises network and the to establish
IMPLEMENTATION OF INTELLIGENT FIREWALL TO CHECK INTERNET HACKERS THREAT
IMPLEMENTATION OF INTELLIGENT FIREWALL TO CHECK INTERNET HACKERS THREAT Roopa K. Panduranga Rao MV Dept of CS and Engg., Dept of IS and Engg., J.N.N College of Engineering, J.N.N College of Engineering,
High Speed Stateful Packet Inspection in Embedded Data-Driven Firewall
High Speed Stateful Packet Inspection in Embedded Data-Driven Firewall Ruhui Zhang*, Makoto Iwata*, Yuta Shirane*, Teruhisa Asahiyama*, Wenjun Su**, Youquan Zheng** *) Dept. of Information System Engineering,
Deploying De-Duplication on Ext4 File System
Deploying De-Duplication on Ext4 File System Usha A. Joglekar 1, Bhushan M. Jagtap 2, Koninika B. Patil 3, 1. Asst. Prof., 2, 3 Students Department of Computer Engineering Smt. Kashibai Navale College
HANIC 100G: Hardware accelerator for 100 Gbps network traffic monitoring
CESNET Technical Report 2/2014 HANIC 100G: Hardware accelerator for 100 Gbps network traffic monitoring VIKTOR PUš, LUKÁš KEKELY, MARTIN ŠPINLER, VÁCLAV HUMMEL, JAN PALIČKA Received 3. 10. 2014 Abstract
Cisco IOS Flexible NetFlow Technology
Cisco IOS Flexible NetFlow Technology Last Updated: December 2008 The Challenge: The ability to characterize IP traffic and understand the origin, the traffic destination, the time of day, the application
Gaining Operational Efficiencies with the Enterasys S-Series
Gaining Operational Efficiencies with the Enterasys S-Series Hi-Fidelity NetFlow There is nothing more important than our customers. Gaining Operational Efficiencies with the Enterasys S-Series Introduction
Attaining EDF Task Scheduling with O(1) Time Complexity
Attaining EDF Task Scheduling with O(1) Time Complexity Verber Domen University of Maribor, Faculty of Electrical Engineering and Computer Sciences, Maribor, Slovenia (e-mail: [email protected]) Abstract:
Comparison of Firewall, Intrusion Prevention and Antivirus Technologies
White Paper Comparison of Firewall, Intrusion Prevention and Antivirus Technologies How each protects the network Juan Pablo Pereira Technical Marketing Manager Juniper Networks, Inc. 1194 North Mathilda
PROFESSIONAL SECURITY SYSTEMS
PROFESSIONAL SECURITY SYSTEMS Security policy, active protection against network attacks and management of IDP Introduction Intrusion Detection and Prevention (IDP ) is a new generation of network security
CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013
CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access
Fuzzy Network Profiling for Intrusion Detection
Fuzzy Network Profiling for Intrusion Detection John E. Dickerson ([email protected]) and Julie A. Dickerson ([email protected]) Electrical and Computer Engineering Department Iowa State University
Intrusion Detection in AlienVault
Complete. Simple. Affordable Copyright 2014 AlienVault. All rights reserved. AlienVault, AlienVault Unified Security Management, AlienVault USM, AlienVault Open Threat Exchange, AlienVault OTX, Open Threat
An Extensible, System-On-Programmable-Chip, Content-Aware Internet Firewall
An Extensible, System-On-Programmable-Chip, Content-Aware Internet Firewall John W. Lockwood, Christopher Neely, Christopher Zuver, James Moscola, Sarang Dharmapurikar, and David Lim Applied Research Laboratory
Dynamic Rule Based Traffic Analysis in NIDS
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 14 (2014), pp. 1429-1436 International Research Publications House http://www. irphouse.com Dynamic Rule Based
40G MACsec Encryption in an FPGA
40G MACsec Encryption in an FPGA Dr Tom Kean, Managing Director, Algotronix Ltd, 130-10 Calton Road, Edinburgh EH8 8JQ United Kingdom Tel: +44 131 556 9242 Email: [email protected] February 2012 1 MACsec
NSC 93-2213-E-110-045
NSC93-2213-E-110-045 2004 8 1 2005 731 94 830 Introduction 1 Nowadays the Internet has become an important part of people s daily life. People receive emails, surf the web sites, and chat with friends
Detection of Distributed Denial of Service Attack with Hadoop on Live Network
Detection of Distributed Denial of Service Attack with Hadoop on Live Network Suchita Korad 1, Shubhada Kadam 2, Prajakta Deore 3, Madhuri Jadhav 4, Prof.Rahul Patil 5 Students, Dept. of Computer, PCCOE,
How To Protect Your Data From Being Hacked On Security Cloud
F-SECURE SECURITY CLOUD Purpose, function and benefits October 2015 CONTENTS F-Secure Security Cloud in brief 2 Security Cloud benefits 3 How does Security Cloud work? 4 Security Cloud metrics 4 Security
A Review of Anomaly Detection Techniques in Network Intrusion Detection System
A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In
Big Data Technology Map-Reduce Motivation: Indexing in Search Engines
Big Data Technology Map-Reduce Motivation: Indexing in Search Engines Edward Bortnikov & Ronny Lempel Yahoo Labs, Haifa Indexing in Search Engines Information Retrieval s two main stages: Indexing process
From Network Security To Content Filtering
Computer Fraud & Security, May 2007 page 1/10 From Network Security To Content Filtering Network security has evolved dramatically in the last few years not only for what concerns the tools at our disposals
Vulnerability Analysis of Hash Tables to Sophisticated DDoS Attacks
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 12 (2014), pp. 1167-1173 International Research Publications House http://www. irphouse.com Vulnerability
A low-cost, connection aware, load-balancing solution for distributing Gigabit Ethernet traffic between two intrusion detection systems
Iowa State University Digital Repository @ Iowa State University Graduate Theses and Dissertations Graduate College 2010 A low-cost, connection aware, load-balancing solution for distributing Gigabit Ethernet
7a. System-on-chip design and prototyping platforms
7a. System-on-chip design and prototyping platforms Labros Bisdounis, Ph.D. Department of Computer and Communication Engineering 1 What is System-on-Chip (SoC)? System-on-chip is an integrated circuit
IMPROVING PERFORMANCE OF RANDOMIZED SIGNATURE SORT USING HASHING AND BITWISE OPERATORS
Volume 2, No. 3, March 2011 Journal of Global Research in Computer Science RESEARCH PAPER Available Online at www.jgrcs.info IMPROVING PERFORMANCE OF RANDOMIZED SIGNATURE SORT USING HASHING AND BITWISE
Dr. Arjan Durresi Louisiana State University, Baton Rouge, LA 70803 [email protected]. DDoS and IP Traceback. Overview
DDoS and IP Traceback Dr. Arjan Durresi Louisiana State University, Baton Rouge, LA 70803 [email protected] Louisiana State University DDoS and IP Traceback - 1 Overview Distributed Denial of Service
Industrial Firewalls Endpoint Security
Industrial Firewalls Endpoint Security Is there a need for a new type of industrial firewall? Industries have a huge park of different management and control systems to monitor their production. These
Big Data & Scripting Part II Streaming Algorithms
Big Data & Scripting Part II Streaming Algorithms 1, Counting Distinct Elements 2, 3, counting distinct elements problem formalization input: stream of elements o from some universe U e.g. ids from a set
Description: Objective: Attending students will learn:
Course: Introduction to Cyber Security Duration: 5 Day Hands-On Lab & Lecture Course Price: $ 3,495.00 Description: In 2014 the world has continued to watch as breach after breach results in millions of
2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
Index Terms Domain name, Firewall, Packet, Phishing, URL.
BDD for Implementation of Packet Filter Firewall and Detecting Phishing Websites Naresh Shende Vidyalankar Institute of Technology Prof. S. K. Shinde Lokmanya Tilak College of Engineering Abstract Packet
Securing the Intelligent Network
WHITE PAPER Securing the Intelligent Network Securing the Intelligent Network New Threats Demand New Strategies The network is the door to your organization for both legitimate users and would-be attackers.
A Protocol Based Packet Sniffer
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 3, March 2015,
Ethernet. Ethernet. Network Devices
Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking
Router Architectures
Router Architectures An overview of router architectures. Introduction What is a Packet Switch? Basic Architectural Components Some Example Packet Switches The Evolution of IP Routers 2 1 Router Components
ACHILLES CERTIFICATION. SIS Module SLS 1508
ACHILLES CERTIFICATION PUBLIC REPORT Final DeltaV Report SIS Module SLS 1508 Disclaimer Wurldtech Security Inc. retains the right to change information in this report without notice. Wurldtech Security
CSE331: Introduction to Networks and Security. Lecture 18 Fall 2006
CSE331: Introduction to Networks and Security Lecture 18 Fall 2006 Announcements Project 2 is due next Weds. Homework 2 has been assigned: It's due on Monday, November 6th. CSE331 Fall 2004 2 Attacker
Improving the Database Logging Performance of the Snort Network Intrusion Detection Sensor
-0- Improving the Database Logging Performance of the Snort Network Intrusion Detection Sensor Lambert Schaelicke, Matthew R. Geiger, Curt J. Freeland Department of Computer Science and Engineering University
Network- vs. Host-based Intrusion Detection
Network- vs. Host-based Intrusion Detection A Guide to Intrusion Detection Technology 6600 Peachtree-Dunwoody Road 300 Embassy Row Atlanta, GA 30348 Tel: 678.443.6000 Toll-free: 800.776.2362 Fax: 678.443.6477
packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3.
Implementation of an Emulation Environment for Large Scale Network Security Experiments Cui Yimin, Liu Li, Jin Qi, Kuang Xiaohui National Key Laboratory of Science and Technology on Information System
A NOVEL APPROACH FOR PROTECTING EXPOSED INTRANET FROM INTRUSIONS
A NOVEL APPROACH FOR PROTECTING EXPOSED INTRANET FROM INTRUSIONS K.B.Chandradeep Department of Centre for Educational Technology, IIT Kharagpur, Kharagpur, India [email protected] ABSTRACT This paper
Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering
Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls
Data Sheet. VLD 500 A Series Viaedge Load Director. VLD 500 A Series: VIAEDGE Load Director
Data Sheet VLD 500 A Series Viaedge Load Director VLD 500 A Series: VIAEDGE Load Director VLD : VIAEDGE Load Director Key Advantages: Server Load Balancing for TCP/UDP based protocols. Server load balancing
10 Key Things Your VoIP Firewall Should Do. When voice joins applications and data on your network
10 Key Things Your Firewall Should Do When voice joins applications and data on your network Table of Contents Making the Move to 3 10 Key Things 1 Security is More Than Physical 4 2 Priority Means Clarity
Network traffic monitoring and management. Sonia Panchen [email protected] 11 th November 2010
Network traffic monitoring and management Sonia Panchen [email protected] 11 th November 2010 Lecture outline What is network traffic management? Traffic management applications Traffic monitoring
