A Fast Pattern-Matching Algorithm for Network Intrusion Detection System
|
|
|
- Jack Gregory
- 10 years ago
- Views:
Transcription
1 A Fast Pattern-Matching Algorithm for Network Intrusion Detection System Jung-Sik Sung 1, Seok-Min Kang 2, Taeck-Geun Kwon 2 1 ETRI, 161 Gajeong-dong, Yuseong-gu, Daejeon, , Korea [email protected] 2 Chungnam National University, 220 Gung-dong, Yuseong-gu, Daejeon, , Korea {esemkang, tgkwon}@cnu.ac.kr Abstract. We present a multi-gigabit rate multiple pattern-matching algorithm with TCAM that enables protecting against malicious attacks in a high-speed network. The proposed algorithm significantly reduces the number of TCAM lookups per payload with m-byte jumping window scheme. Due to the reduced number of TCAM lookups, we can easily achieve multi-gigabit rate for scanning the packet payload in order to inspect the content. Furthermore, multi-packet inspection is achieved easily by the extended state transition diagram with the shifting distance. With experimental results, we have clearly justified the proposed algorithm works well for a multi-gigabit network intrusion detection system. 1. Introduction Network intrusion detection systems (NIDSs) monitor every packet in the network to detect malicious attacks. In a high-speed network, an NIDS may be overloaded as the packet arrival rate becomes high. Hence, the hardware-based approach of implementing the NIDS will be appropriate in order to support the high-speed network. Some researches [1], [2], [3] focus on the hardware implementation to achieve the line-speed intrusion detection. Recently, technologies for high performance network processors have driven a new breed of solutions that perform at high data rates while remaining flexible through software [4]. There are many approaches for solving multiple pattern-matching problems. The multiple pattern-matching algorithms [5], [6] use software approaches. However, software-based pattern-matching is not able to inspect all packets in the high-speed network. Gigabit rate pattern-matching algorithms such as [7], [8] are TCAM-based algorithms that can be used with TCAM. In this paper, the scheme in [7], [8] is referred to a sliding window in which every one-byte shifted fixed-length partial payload should be examined to match the TCAM and the partial payload should be extracted with a sliding window manner. Although the sliding window based pattern matching is intuitive and simple, the scheme has three problems. First, it has lower This research was supported in part by ITRC program of the Ministry of Information and Communication, Korea. Correspondence to T. -G. Kwon
2 2 Jung-Sik Sung1, Seok-Min Kang2, Taeck-Geun Kwon2 scan speed. It can provide an answer for searching a packet of length n, in a deterministic time of O(n) TCAM lookups, because one TCAM lookup is needed for every byte position in the packet. Since the TCAM lookup time is known and fixed, we need to minimize the number of TCAM lookups per packet to support the multigigabit rate NIDS. Second, it is very complicated and needs more memory when the pattern is longer than TCAM width. Suppose the width of the TCAM is w bytes and let T = t 0,t 1,,t n-1 be the text. Partial pattern is matched at t i,,t i+w-1, it should check whether occurrence of previous partial matching at t i-w,,t i-1, and keeps matching information for next partial matching. Third, it does not support multi-packet inspection where the pattern split into continuous two payloads. This situation is common in NIDS, where intrusion signatures can be segmented into packets which contain the user data such as s, attached files, etc. In this paper, we revise deep packet inspection algorithm introduced in our recent paper [9] and extend the algorithm to provide content inspection over multiple packets. In our algorithm, TCAM lookups for searching a packet of length n, is O(n/m), if the size of the jumping window is m. We devise the state transition diagram for keeping previous partial matching when the pattern is longer than TCAM width. So it is very simple and does not waste memory. In order to support multi-packet inspection, we use extended state transition diagram by alignment of the last jumping window of previous payload. In addition, we have implemented the proposed algorithm using Intel IXP28XX network processors (NPs) with TCAM. We have some preliminary experimental results which verify the proposed scheme improves significantly the performance of deep packet inspection. The rest of the paper is organized as follows. In Section 2, we describe problems of multiple pattern-matching using TCAM. We explain the jumping window algorithms to map the multiple patterns into TCAM and efficiently scan packets at high speeds in Section 3. In Section 4, we extend the algorithm in order to inspect multiple packets. In Section 5, we give experimental results with our 10Gbps network processor based NIDS. Finally, we conclude the paper. 2. Jumping Window Pattern Match Algorithm A pattern is a string to be searched for a payload and it usually appears at an arbitrary position in the payload. For example, virus and worm patterns are located in an attached file and they may appear at any position in the packet payload. We should search several sub-patterns relevant to each jumping window for matching a pattern if the pattern would be occupied into continuous several jumping windows of a payload. In other words, we can create TCAM entries, all possible position-aware patterns (PAPs) from one pattern. Therefore, we succeed pattern-matching with jumpingwindow scheme although the pattern appears at an arbitrary position in the payload. Let T = t 0,t 1,,t n-1 be the payload, and its length be n bytes. Let P = p 0,p 1,, p m-1 be the pattern to be searched, and its length be m bytes. P is located in the substring of T, where t s,,t s+m-1 = p 0,,p m-1, 0 s n-m. (1)
3 A Fast Pattern-Matching Algorithm for Network Intrusion Detection System( 3 The payload is divided into multiple jumping window substrings with m-byte window, where sm,..., t( s+ 1) m 1, 0 t n m s. m If (m-i) sequential bytes of P is found from i th position within s th jumping window substring of T, where t sm+i,,t (s+1)m-1 = p 0,,p m-1-i, i=0,1,2,,m-1. (3) Then, the rest of P, the remaining i bytes is found from the first position within (s+1) th jumping window substring of T. On this occasion, P is found in T. Therefore, we can make PAPs from P with 0~(m-1) shifting and can split PAPs into fixed-size subpatterns, position-aware sub-patterns(pases) as shown in Fig. 1 ( - denotes don t care state of TCAM). We can match the pattern P in the payload T with jumping window scheme when these PASes generated from P are stored in the TCAM. (2) Fig. 1. Position-aware patterns and position-aware fixed sub-patterns Fig. 2. State transition diagram Given the pattern of GATT the position of the pattern in the payload is one of GATT, GATT, GATT,, (m -1) GATT. When m is 4, the pattern may be found at the different position of the payload such as GATT, GATT, GATT, or GATT. We put the above derived patterns into the TCAM table. Then, a TCAM lookup operation is carried out for every segment of m bytes called a
4 4 Jung-Sik Sung1, Seok-Min Kang2, Taeck-Geun Kwon2 jumping window for a packet payload. Usually, the width of the TCAM, which will be used for matching the pattern in a parallel way, is fixed. Therefore, if the TCAM width is smaller than the pattern, we have to split a long pattern into shorter subpatterns with the same length of the TCAM width. If one PAP splits into several PASes, a pattern-matching operation will be completed when all PASes are matched to the TCAM entries in series. Hence, for the matching operation of multiple PASes, a PAS matching function requires the result of the previous PAS matching operation. To increase the speed of searching, we employ the state transition diagram to find the result of the previous PAS matching operation as shown in Fig Multi-packet inspection We consider a pattern that split on two payloads T i, T i+1 and it usually appears at several jumping windows of T i, T i+1. That is, it split into tail end of the former and beginning of the latter. In case of Fig. 3 (a), the pattern P = p 0,p 1,,p m-1 split into p 0 and p 1 p 2 p m-1 in T i and T i+1, respectively. At the window before last of T i as illustrated in Fig. 3 (a), pattern-matching does not occur and the state is initial state, 0. We fit the last window with shifting distance because the remaining bytes are too small to fit into the jumping window. There is no previous pattern-matching, the state of the last window is initial state, 0. However in case of Fig. 3 (b), the partial pattern p 0 is matched and transits to state S m-1. Due to lookup TCAM with m-byte window, the last window of T i needs m-byte alignment. The start point of last window is shifted to m-(n%m) bytes left. We call it shifting distance. In order to fit the last window, the pre-condition state should be changed according to the shifting distance. For example, state S m-1 must move into initial state 0 if 3 bytes, i.e., p 0, are shifted for fitting the last search window. Fig. 3. Example of multi-packet inspection processing: shifted state transition for alignment of a search window For the split pattern matching, states can move to other states in order to align the last window if the previous partial match is done successfully. The state transition
5 A Fast Pattern-Matching Algorithm for Network Intrusion Detection System( 5 diagram should have this state transition information for the alignment. With the extended state transition, split pattern into the next packet payload can be easily matched. Furthermore, it requires storing only the last state information instead of the large packet reassembly buffer. 4 Performance Evaluation For the evaluation of the multi-gigabit rate pattern-matching in NIDS, we have implemented IDS microblock which is a microcode program of Intel IXP28XX NP [10] to detect intrusion patterns in the packet payload. The IXP28XX NP development platform consists of dual network processor units (NPUs), 9-Mbit IDT s TCAM [11], and 10 ports of gigabit Ethernet (GbE). In this paper, we have generated packets matched with the Snort rule header using the traffic generator Smartbits 6000B. In the following experiments, throughputs are measured for various packet lengths with a single microengine (ME). Although the Intel IXP28XX NPU has 16 MEs, only 12 MEs are used to receive and transmit packets through external interfaces and process them in the current Intel s 10-port GbE IPv4/IPv6 forwarding application. We could add at most 4 MEs without modification of the current application for implementing our algorithm. Fig. 4. Compares of TCAM Access Fig. 5. Effects of the window size, m Fig. 4 shows the result of TCAM access for pattern matching with varying the packet size for sliding window and 8-byte jumping window. For this experiment, only one ME is used for deep packet inspection among 16MEs. The number of TCAM access of sliding window increases rapidly as the packet length increases, while that of our algorithm increases slowly. With the maximum packet size, i.e., 1518 bytes in the Internet, the throughput of our proposed algorithm is about 1Gbps, while sliding window shows only the performance of about 200Mbps[12]. In this experiment, we proved that the number of TCAM access in the 8-byte jumping window is approximately 1/8 of the number of TCAM access in the sliding window scheme. Fig. 5 shows the effect of the window size, m. As the window size increases, the number of TCAM access is reduced 1/m.
6 6 Jung-Sik Sung1, Seok-Min Kang2, Taeck-Geun Kwon2 5 Conclusion In this paper, we have presented a multi-gigabit pattern-matching algorithm for network intrusion detection system in the high-speed network. The TCAM-based deep packet inspection algorithm developed in this paper uses a jumping window scheme, which is supported by position-aware sub-patterns and the state transition diagram to reduce the number of TCAM lookups. We have implemented the proposed algorithm on the Intel IXDP28xx platform. The performance of packet processing with our proposed algorithm is more than 3Gbps at the worst-case situation with the maximum packet size. We expect an increase of the performance through microcode optimization and window size augment. We ve proven the feasibility of the proposed algorithm with our experimental implementation that runs on the IXDP28xx platform. In order to detect malicious attack split in two continuous packet, we extended the state transition diagram with shifting distance. Therefore, first pattern-matching in next packet is achieved easily with the state transition of previous packet. In this paper, we describe that the pattern length is the same value as window size, m. However, our proposed algorithm is applicable even if it is greater or lesser than window size m. References 1. S. Dharmapurikar, P. Krishnamurthy, T. S. Sproull and J. W. Lockwood: Deep Packet Inspection using Parallel Bloom Filters in IEEE Micro, Vol. 24, No. 1, Jan. 2004, J. Lockwood, J. Moscola, M. Kulig, D. Reddick, and T. Brooks: Internet Worm and Virus Protection in Dynamically Reconfigurable Hardware in Military and Aerospace Programmable Logic Device (MAPLD), Sep I. Sourdis and D. Pnevmatikatos: Fast, Large-Scale String Match for a 10Gbps FPGA-based Network Intrusion Detection System in Conference on Field Programmable Logic and Applications, Sep P. Jungck and S. S.Y. Shim: Issues in high-speed internet security in IEEE Computer Magazine, Vol. 37, No. 7, July 2004, M. Fisk and G. Varghese: Fast content-based packet handling for intrusion detection in Tech. Report CS , UCSD, May S. Wu and U. Manber: A fast algorithm for multi-pattern searching in Tech. Report, TR94-17, University of Arizona, May J. Bo and L. Bin: High-speed discrete content Sensitive pattern match algorithm for deep packet filtering in Int l Conf on Computer Networks and Mobile Computing, F. Yu, R. H. Katz and T. V. Lakshman: Gigabit rate packet pattern-matching using TCAM in IEEE Int l Conf on Network Protocols, Oct. 2004, J. Sung, S. Kang, Y. Lee, T. Kwon, and B. Kim: A Multi-gigabit Rate Deep Packet Inspection Algorithm using TCAM in IEEE Globecom, Nov Intel: Intel 2800 Network Processor in Hardware Reference Manual, Jan IDT: Integrated IP Co-Processor (IIPC) with QDR Interface in IDT75K52134/ IDT75K62134 User Manual, Sep S. Kang, I. Song, Y. Lee, and T. Kwon: Design and Implementation of a Multi-gigabit Intrusion and Virus/Worm Detection System in IEEE ICC, June 2006 (to appear).
Signature-aware Traffic Monitoring with IPFIX 1
Signature-aware Traffic Monitoring with IPFIX 1 Youngseok Lee, Seongho Shin, and Taeck-geun Kwon Dept. of Computer Engineering, Chungnam National University, 220 Gungdong Yusonggu, Daejon, Korea, 305-764
Configurable String Matching Hardware for Speeding up Intrusion Detection. Monther Aldwairi*, Thomas Conte, Paul Franzon
Configurable String Matching Hardware for Speeding up Intrusion Detection Monther Aldwairi*, Thomas Conte, Paul Franzon Department of Electrical and Computer Engineering, North Carolina State University,
MAXIMIZING RESTORABLE THROUGHPUT IN MPLS NETWORKS
MAXIMIZING RESTORABLE THROUGHPUT IN MPLS NETWORKS 1 M.LAKSHMI, 2 N.LAKSHMI 1 Assitant Professor, Dept.of.Computer science, MCC college.pattukottai. 2 Research Scholar, Dept.of.Computer science, MCC college.pattukottai.
BITWISE OPTIMISED CAM FOR NETWORK INTRUSION DETECTION SYSTEMS. Sherif Yusuf and Wayne Luk
BITWISE OPTIMISED CAM FOR NETWORK INTRUSION DETECTION SYSTEMS Sherif Yusuf and Wayne Luk Department of Computing, Imperial College London, 180 Queen s Gate, London SW7 2BZ email: {sherif.yusuf, w.luk}@imperial.ac.uk
Robust Quick String Matching Algorithm for Network Security
18 IJCSNS International Journal of Computer Science and Network Security, VOL.6 No.7B, July 26 Robust Quick String Matching Algorithm for Network Security Jianming Yu, 1,2 and Yibo Xue, 2,3 1 Department
Compiling PCRE to FPGA for Accelerating SNORT IDS
Compiling PCRE to FPGA for Accelerating SNORT IDS Abhishek Mitra Walid Najjar Laxmi N Bhuyan QuickTime and a QuickTime and a decompressor decompressor are needed to see this picture. are needed to see
Architecture of distributed network processors: specifics of application in information security systems
Architecture of distributed network processors: specifics of application in information security systems V.Zaborovsky, Politechnical University, Sait-Petersburg, Russia [email protected] 1. Introduction Modern
Aggregated Bloom Filters For Intrusion Detection And Prevention Hardware
Aggregated Bloom Filters For Intrusion Detection And Prevention Hardware N. Sertac Artan, Kaustubh Sinkar, Jalpa Patel, and H. Jonathan Chao Department of Electrical and Computer Engineering Polytechnic
respectively. Section IX concludes the paper.
1 Fast and Scalable Pattern Matching for Network Intrusion Detection Systems Sarang Dharmapurikar, and John Lockwood, Member IEEE Abstract High-speed packet content inspection and filtering devices rely
DRAFT 18-09-2003. 2.1 Gigabit network intrusion detection systems
An Intrusion Detection System for Gigabit Networks (Working paper: describing ongoing work) Gerald Tripp Computing Laboratory, University of Kent. CT2 7NF. UK e-mail: [email protected] This draft
The Load Balancing System Design of Service Based on IXP2400 Yi Shijun 1, a, Jing Xiaoping 1,b
Advanced Engineering Forum Vol. 1 (2011) pp 42-46 Online: 2011-09-09 (2011) Trans Tech Publications, Switzerland doi:10.4028/www.scientific.net/aef.1.42 The Load Balancing System Design of Service Based
FPGA Implementation of Network Security System Using Counting Bloom Filter
International Journal of Research in Information Technology (IJRIT) www.ijrit.com ISSN 2001-5569 FPGA Implementation of Network Security System Using Counting Bloom Filter Shruti, Harshada J. Patil 1PG
Exploiting Stateful Inspection of Network Security in Reconfigurable Hardware
Exploiting Stateful Inspection of Network Security in Reconfigurable Hardware Shaomeng Li, Jim Tørresen, Oddvar Søråsen Department of Informatics University of Oslo N-0316 Oslo, Norway {shaomenl, jimtoer,
Two State Intrusion Detection System Against DDos Attack in Wireless Network
Two State Intrusion Detection System Against DDos Attack in Wireless Network 1 Pintu Vasani, 2 Parikh Dhaval 1 M.E Student, 2 Head of Department (LDCE-CSE) L.D. College of Engineering, Ahmedabad, India.
UNITE: Uniform hardware-based Network Intrusion detection Engine
UNITE: Uniform hardware-based Network Intrusion detection Engine S. Yusuf and W. Luk and M. K. N. Szeto and W. Osborne Department of Computing, Imperial College London, 180 Queen s Gate, London SW7 2BZ
Extensible Network Configuration and Communication Framework
Extensible Network Configuration and Communication Framework Todd Sproull and John Lockwood Applied Research Laboratory Department of Computer Science and Engineering: Washington University in Saint Louis
High Performance String Matching Algorithm for a Network Intrusion Prevention System (NIPS)
High Performance String Matching Algorithm for a Network Intrusion Prevention System (NIPS) Yaron Weinsberg Shimrit Tzur-David Danny Dolev The Hebrew University Of Jerusalem Email: {wyaron,shimritd,dolev}@cs.huji.ac.il
Network Function Virtualization based on FPGAs: A Framework for all-programmable network devices
Network Function Virtualization based on FPGAs: A Framework for all-programmable network devices Christoforos Kachris, Georgios Sirakoulis Electrical and Computer Engineering Department Democritus University
High-Performance IP Service Node with Layer 4 to 7 Packet Processing Features
UDC 621.395.31:681.3 High-Performance IP Service Node with Layer 4 to 7 Packet Processing Features VTsuneo Katsuyama VAkira Hakata VMasafumi Katoh VAkira Takeyama (Manuscript received February 27, 2001)
Improving the Database Logging Performance of the Snort Network Intrusion Detection Sensor
-0- Improving the Database Logging Performance of the Snort Network Intrusion Detection Sensor Lambert Schaelicke, Matthew R. Geiger, Curt J. Freeland Department of Computer Science and Engineering University
An Extensible, System-On-Programmable-Chip, Content-Aware Internet Firewall
An Extensible, System-On-Programmable-Chip, Content-Aware Internet Firewall John W. Lockwood, Christopher Neely, Christopher Zuver, James Moscola, Sarang Dharmapurikar, and David Lim Applied Research Laboratory
FPGA Implementation of IP Packet Segmentation and Reassembly in Internet Router*
SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 6, No. 3, December 2009, 399-407 UDK: 004.738.5.057.4 FPGA Implementation of IP Packet Segmentation and Reassembly in Internet Router* Marko Carević 1,a,
Network Intrusion Prevention Systems: Signature-Based and Anomaly Detection
Network Intrusion Prevention Systems: Signature-Based and Anomaly Detection Thesis for the degree of DOCTOR of PHILOSOPHY by Shimrit Tzur-David SUBMITTED TO THE SENATE OF THE HEBREW UNIVERSITY OF JERUSALEM
Algorithms for Advanced Packet Classification with Ternary CAMs
Algorithms for Advanced Packet Classification with Ternary CAMs Karthik Lakshminarayanan UC Berkeley Joint work with Anand Rangarajan and Srinivasan Venkatachary (Cypress Semiconductor) Packet Processing
Principle and Implementation of. Protocol Oblivious Forwarding
Principle and Implementation of Protocol Oblivious Forwarding PUBLICATION DATE DECEMBER 27, 2012 Contents Principle and Implementation of... 1 Protocol Oblivious Forwarding... 1 AUTHORS... 错 误! 未 定 义 书
Network Based Intrusion Detection Using Honey pot Deception
Network Based Intrusion Detection Using Honey pot Deception Dr.K.V.Kulhalli, S.R.Khot Department of Electronics and Communication Engineering D.Y.Patil College of Engg.& technology, Kolhapur,Maharashtra,India.
MIDeA: A Multi-Parallel Intrusion Detection Architecture
MIDeA: A Multi-Parallel Intrusion Detection Architecture Giorgos Vasiliadis, FORTH-ICS, Greece Michalis Polychronakis, Columbia U., USA Sotiris Ioannidis, FORTH-ICS, Greece CCS 2011, 19 October 2011 Network
How to Build a Massively Scalable Next-Generation Firewall
How to Build a Massively Scalable Next-Generation Firewall Seven measures of scalability, and how to use them to evaluate NGFWs Scalable is not just big or fast. When it comes to advanced technologies
THE growth and success of the Internet has made it
IEEE COMMUNICATIONS SURVEYS & TUTORIALS, 2010 1 A Survey on the Application of FPGAs for Network Infrastructure Security Hao Chen,Yu Chen*, Douglas H. Summerville Abstract Given the rapid evolution of
Open Flow Controller and Switch Datasheet
Open Flow Controller and Switch Datasheet California State University Chico Alan Braithwaite Spring 2013 Block Diagram Figure 1. High Level Block Diagram The project will consist of a network development
IBM Proventia Network Intrusion Prevention System With Crossbeam X80 Platform
IBM Proventia Network Intrusion Prevention System With Crossbeam X80 Platform September 2008 pg. 1 Executive Summary The objective of this report is to provide performance guidance for IBM s Proventia
A Fast Path Recovery Mechanism for MPLS Networks
A Fast Path Recovery Mechanism for MPLS Networks Jenhui Chen, Chung-Ching Chiou, and Shih-Lin Wu Department of Computer Science and Information Engineering Chang Gung University, Taoyuan, Taiwan, R.O.C.
Index Terms Domain name, Firewall, Packet, Phishing, URL.
BDD for Implementation of Packet Filter Firewall and Detecting Phishing Websites Naresh Shende Vidyalankar Institute of Technology Prof. S. K. Shinde Lokmanya Tilak College of Engineering Abstract Packet
A NOVEL APPROACH FOR PROTECTING EXPOSED INTRANET FROM INTRUSIONS
A NOVEL APPROACH FOR PROTECTING EXPOSED INTRANET FROM INTRUSIONS K.B.Chandradeep Department of Centre for Educational Technology, IIT Kharagpur, Kharagpur, India [email protected] ABSTRACT This paper
Performance of Software Switching
Performance of Software Switching Based on papers in IEEE HPSR 2011 and IFIP/ACM Performance 2011 Nuutti Varis, Jukka Manner Department of Communications and Networking (COMNET) Agenda Motivation Performance
Aho-Corasick FSM Implementation for
A Memory-Efficient Reconfigurable Aho-Corasick FSM Implementation for Intrusion Detection Systems Vassilis Dimopoulos*, Joannis Papaefstathiou* and Dionisios Pnevmatikatost* Electronic and Computer Engineering
The Fundamentals of Intrusion Prevention System Testing
The Fundamentals of Intrusion Prevention System Testing New network-based Intrusion Prevention Systems (IPS) complement traditional security products to provide enterprises with unparalleled protection
Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks
Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks Prashil S. Waghmare PG student, Sinhgad College of Engineering, Vadgaon, Pune University, Maharashtra, India. [email protected]
How To Protect Your Network From Intrusions From A Malicious Computer (Malware) With A Microsoft Network Security Platform)
McAfee Security: Intrusion Prevention System REV: 0.1.1 (July 2011) 1 Contents 1. McAfee Network Security Platform...3 2. McAfee Host Intrusion Prevention for Server...4 2.1 Network IPS...4 2.2 Workload
Intrusion Detection System
Intrusion Detection System Time Machine Dynamic Application Detection 1 NIDS: two generic problems Attack identified But what happened in the past??? Application identification Only by port number! Yet
Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP
Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP Aakanksha Vijay M.tech, Department of Computer Science Suresh Gyan Vihar University Jaipur, India Mrs Savita Shiwani Head Of
Bricata Next Generation Intrusion Prevention System A New, Evolved Breed of Threat Mitigation
Bricata Next Generation Intrusion Prevention System A New, Evolved Breed of Threat Mitigation Iain Davison Chief Technology Officer Bricata, LLC WWW.BRICATA.COM The Need for Multi-Threaded, Multi-Core
Network Intrusion Detection Systems. Beyond packet filtering
Network Intrusion Detection Systems Beyond packet filtering Goal of NIDS Detect attacks as they happen: Real-time monitoring of networks Provide information about attacks that have succeeded: Forensic
Design of an Application Programming Interface for IP Network Monitoring
Design of an Application Programming Interface for IP Network Monitoring Evangelos P. Markatos Kostas G. Anagnostakis Arne Øslebø Michalis Polychronakis Institute of Computer Science (ICS), Foundation
Product Summary Report
Product Summary Report March 2008 S Report 080330 olera Networks engaged Miercom, to independently evaluate the performance of its Model DS5100 deep packet capture and storage appliance. Testing was conducted
A Real-Time Network Traffic Based Worm Detection System for Enterprise Networks
A Real-Time Network Traffic Based Worm Detection System for Enterprise Networks Long-Quan Zhao 1, Seong-Chul Hong 1, Hong-Taek Ju 2 and James Won-Ki Hong 1 1 Dept. of Computer Science and Engineering,
Steve Worrall Systems Engineer. [email protected]
Steve Worrall Systems Engineer [email protected] Agenda 100GbE Load sharing/link aggregation Foundry Direct Routing 2 100 Gigabit Ethernet 3 Current Status PAR approved, 802.3ba task force set up
Content Inspection Director
Content Inspection Director High Speed Content Inspection North America Radware Inc. 575 Corporate Dr. Suite 205 Mahwah, NJ 07430 Tel 888 234 5763 International Radware Ltd. 22 Raoul Wallenberg St. Tel
A Novel Distributed Denial of Service (DDoS) Attacks Discriminating Detection in Flash Crowds
International Journal of Research Studies in Science, Engineering and Technology Volume 1, Issue 9, December 2014, PP 139-143 ISSN 2349-4751 (Print) & ISSN 2349-476X (Online) A Novel Distributed Denial
Are Second Generation Firewalls Good for Industrial Control Systems?
Are Second Generation Firewalls Good for Industrial Control Systems? Bernie Pella, CISSP Schneider Electric Cyber Security Services [email protected] Firewall Overview Firewalls provide
Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking
Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking Burjiz Soorty School of Computing and Mathematical Sciences Auckland University of Technology Auckland, New Zealand
Delivering 160Gbps DPI Performance on the Intel Xeon Processor E5-2600 Series using HyperScan
SOLUTION WHITE PAPER Intel processors Pattern Matching Library Software Delivering 160Gbps DPI Performance on the Intel Xeon Processor E5-2600 Series using HyperScan HyperScan s runtime is engineered for
TCP/IP Jumbo Frames Network Performance Evaluation on A Testbed Infrastructure
I.J. Wireless and Microwave Technologies, 2012, 6, 29-36 Published Online December 2012 in MECS (http://www.mecs-press.net) DOI: 10.5815/ijwmt.2012.06.05 Available online at http://www.mecs-press.net/ijwmt
Symantec Enterprise Firewalls. From the Internet Thomas Jerry Scott
Symantec Enterprise Firewalls From the Internet Thomas Symantec Firewalls Symantec offers a whole line of firewalls The Symantec Enterprise Firewall, which emerged from the older RAPTOR product We are
CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013
CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access
packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3.
Implementation of an Emulation Environment for Large Scale Network Security Experiments Cui Yimin, Liu Li, Jin Qi, Kuang Xiaohui National Key Laboratory of Science and Technology on Information System
Stateful Inspection Firewall Session Table Processing
International Journal of Information Technology, Vol. 11 No. 2 Xin Li, ZhenZhou Ji, and MingZeng Hu School of Computer Science and Technology Harbin Institute of Technology 92 West Da Zhi St. Harbin, China
COMPARISON OF ALGORITHMS FOR DETECTING FIREWALL POLICY ANOMALIES
COMPARISON OF ALGORITHMS FOR DETECTING FIREWALL POLICY ANOMALIES 1 SHILPA KALANTRI, 2 JYOTI JOGLEKAR 1,2 Computer Engineering Department, Shah and Anchor Kutchhi Engineering College, Mumbai, India E-mail:
IP address lookup for Internet routers using cache routing table
ISSN (Print): 1694 0814 35 IP address lookup for Internet routers using cache routing table Houassi Hichem 1 and Bilami Azeddine 2 1 Department of Computer Science, University Center of Khenchela, Algeria
Dual Mechanism to Detect DDOS Attack Priyanka Dembla, Chander Diwaker 2 1 Research Scholar, 2 Assistant Professor
International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) International Journal of Engineering, Business and Enterprise
The Design and Implementation of Content Switch On IXP12EB
The Design and Implementation of Content Switch On IXP12EB Thesis Proposal by Longhua Li Computer Science Department University of Colorado at Colorado Springs 5/15/2001 Approved by: Dr. Edward Chow (Advisor)
The Case Against Jumbo Frames. Richard A Steenbergen <[email protected]> GTT Communications, Inc.
The Case Against Jumbo Frames Richard A Steenbergen GTT Communications, Inc. 1 What s This All About? What the heck is a Jumbo Frame? Technically, the IEEE 802.3 Ethernet standard defines
Study and Analysis of Network based Intrusion Detection System
Study and Analysis of Network based Intrusion Detection System Lata 1, Indu Kashyap 2 M.tech student,mriu,fbd,india 1 Assistant professor CSE dept. MRIU, fbd, India2 Abstract:-Intrusion detection system
International Journal of Computer Science and Network (IJCSN) Volume 1, Issue 5, October 2012 www.ijcsn.org ISSN 2277-5420. Bhopal, M.P.
Prevention of Buffer overflow Attack Blocker Using IDS 1 Pankaj B. Pawar, 2 Malti Nagle, 3 Pankaj K. Kawadkar Abstract 1 PIES Bhopal, RGPV University, 2 PIES Bhopal, RGPV University, 3 PIES Bhopal, RGPV
Chapter 9 Firewalls and Intrusion Prevention Systems
Chapter 9 Firewalls and Intrusion Prevention Systems connectivity is essential However it creates a threat Effective means of protecting LANs Inserted between the premises network and the to establish
White Paper Increase Flexibility in Layer 2 Switches by Integrating Ethernet ASSP Functions Into FPGAs
White Paper Increase Flexibility in Layer 2 es by Integrating Ethernet ASSP Functions Into FPGAs Introduction A Layer 2 Ethernet switch connects multiple Ethernet LAN segments. Because each port on the
White Paper Building Flexible, Cost-Efficient Broadband Access Equipment Line Cards
White Paper Building Flexible, Cost-Efficient Broadband Access Equipment Line Cards Telecommunications equipment manufacturers (TEMs) are facing tough challenges with triple play (voice, video and data
Performance Characterization & Improvement of Snort as an IDS
Performance Characterization & Improvement of Snort as an IDS Report prepared by: Soumya Sen Part A: Snort background and performance measure - 2 - 1. Introduction to Snort SNORT is an open source Intrusion
Dynamic Rule Based Traffic Analysis in NIDS
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 14 (2014), pp. 1429-1436 International Research Publications House http://www. irphouse.com Dynamic Rule Based
Intro to Firewalls. Summary
Topic 3: Lesson 2 Intro to Firewalls Summary Basic questions What is a firewall? What can a firewall do? What is packet filtering? What is proxying? What is stateful packet filtering? Compare network layer
GR2000: a Gigabit Router for a Guaranteed Network
Hitachi Review Vol. 48 (1999), No. 4 203 GR2000: a Gigabit Router for a Guaranteed Network Kazuo Sugai Yoshihito Sako Takeshi Aimoto OVERVIEW: Driven by the progress of the information society, corporate
Introduction to Network Traffic Monitoring. Evangelos Markatos. FORTH-ICS [email protected]
Introduction to Network Traffic Monitoring -ICS [email protected] http://www.ics.forth.gr/~markatos Institute of Computer Science (ICS) Foundation for Research and Technology Hellas () Roadmap Motivation
A Protocol Based Packet Sniffer
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 3, March 2015,
SonicWALL Team Nordic Recommendations for safe Unified Threat Management (UTM) Deployments*
SonicWALL Team Nordic Recommendations for safe Unified Threat Management () Deployments* [email protected] tel: +46 8 410 71 700 TZ100/100W 01-SSC-8739 01-SSC-8739 01-SSC-8723 $470/$536W 128Mb RAM 5FE
A Fuzzy Logic-Based Information Security Management for Software-Defined Networks
A Fuzzy Logic-Based Information Security Management for Software-Defined Networks Sergei Dotcenko *, Andrei Vladyko *, Ivan Letenko * * The Bonch-Bruevich Saint-Petersburg State University of Telecommunications,
A Link Layer Discovery Protocol Fuzzer
The University of Texas at Austin, Department of Computer Sciences, Technical Report TR-07-24 A Link Layer Discovery Protocol Fuzzer Jeremy Hollander Department of Computer Sciences The University of Texas
Time-Frequency Detection Algorithm of Network Traffic Anomalies
2012 International Conference on Innovation and Information Management (ICIIM 2012) IPCSIT vol. 36 (2012) (2012) IACSIT Press, Singapore Time-Frequency Detection Algorithm of Network Traffic Anomalies
PIOLINK, Inc. PIOLINK, Inc. commissioned The
PIOLINK, Inc. Layer 4/7 Load Balancer, Firewall Performance and Worm Attack Protection Evaluation Premise: Deploying intelligent Layer 4-7 application switch with firewall functionality is not uncommon
5 Things You Need to Know About Deep Packet Inspection (DPI)
White Paper: 5 Things You Need to Know About Deep Packet Inspection (DPI) By Safa Alkateb Updated April 2011 White Paper: 5 Things You Need to Know about Deep Packet Inspection (DPI) 2 5 Things You Need
18-731 Midterm. Name: Andrew user id:
18-731 Midterm 6 March 2008 Name: Andrew user id: Scores: Problem 0 (10 points): Problem 1 (10 points): Problem 2 (15 points): Problem 3 (10 points): Problem 4 (20 points): Problem 5 (10 points): Problem
