A 10-Gbps High-Speed Single-Chip Network Intrusion Detection and Prevention System

Size: px
Start display at page:

Download "A 10-Gbps High-Speed Single-Chip Network Intrusion Detection and Prevention System"

Transcription

1 A 0-Gbps High-Speed Single-Chip Network Intrusion Detection and Prevention System N. Sertac Artan, Rajdip Ghosh, Yanchuan Guo, and H. Jonathan Chao Department of Electrical and Computer Engineering Polytechnic University, Brooklyn, NY Abstract Network Intrusion Detection and Prevention Systems (NPSs) are vital in the fight against network intrusions. NPSs search for certain malicious content in network traffic (i.e., signatures). Comparing all traffic to these signatures is a challenge for high-speed networks. In this paper, we present the implementation of a 0-Gbps hardware NPS and related design issues. This goal of signature detection at high-speed is achieved using a single FPGA, without any external memory. We also implemented and tested a proof-of-concept system with -Gbps traffic. A database to store and a web server to display the intrusion alerts from the NPS were also developed for this system. I. INTRODUCTION Everyday, it is getting more profitable for malicious intruders to gain unauthorized access to different resources in a network. They sometimes gather critical information (such as credit card numbers), sometimes use computing resources for their illegal activities (such as spam relays), or simply disrupt the legitimate services of these networks. Network Intrusion Detection and Prevention Systems (NPSs) are vital systems for networks to fight against these intrusions. Certain malicious content in network traffic specific to each intrusion (a signature) is used to identify intrusions. NPSs search for these signatures in network traffic to detect and prevent intrusions. To detect signatures, all network traffic should be compared against each and every signature. This is very challenging especially for today s high-speed networks with line speeds of 0 Gbps and beyond. Additionally, the number of signatures increases daily as new intrusion types are introduced. An NPS is required to add these new signatures into its signature list rapidly without disrupting its main operation of detecting and preventing intrusions. Software NPS are not scalable to high-speeds. Hardware NPSs have gained a lot of attention recently due to the intrinsic speed advantage over software systems. In this paper, we present the design of a single-fpga, high-speed, signature-based NPS. Due to its small size, the design allows multiple parallel engines to run on a single FPGA chip, satisfying the high-speed requirement of today s networks. Additionally, the proposed system does not rely on any external memory. It can provide 0-Gbps throughput using a single commodity FPGA and we believe 40-Gbps throughput is achievable on current state-of-the-art FPGAs. Finally, since all signature data is stored in on-chip memory and not embedded into the FPGA logic, no FPGA reconfiguration is needed for signature updates, allowing rapid updates by simple memory updates. The contributions of this paper are as follows, We recently proposed a minimal perfect hashing scheme called TriBiCa (Trie Bitmap Content Analyzer) to efficiently store and query intrusion signatures []. In this paper, the improvements to the basic TriBiCa scheme are presented. A detailed hardware architecture of a 0-Gbps NPS is given and related design issues are addressed. A proof-of-concept design at Gbps is implemented and tested. Various tools, including a tool to automatically map intrusion signatures to on-chip memory in a storageefficient manner, a database to store, and a web server to display the alerts from the NPS, are also developed. The rest of the paper is organized as follows. Section II summarizes the related work on hardware-based NPS. Section III defines the problem of string (signature) matching for NPS using hash tables. Section IV describes the basic data structure, whereas Section V shows the improvements to this basic data structure. Section VI shows the architecture to detect long signatures based on the data structure. Section VII show implementation results of the proposed NPS. Section VII also describes the issues experienced during the design and testing of the NPS. Finally, Section VIII concludes the paper. II. RELATED WORK Current state-of-the-art hardware NPSs are either fast but hard to update, or easy to update but slow. One hardware NPS approach (such as [2], [3]) is to store signature data on off-chip memory. These systems are easy to update, since the update operation consists of replacing only a few values in external memory. However, access to data on external memory takes much longer than access to on-chip data. In other words, the speed of these NPSs is determined by the speed of external memory access rather than on-chip speeds. This is not acceptable for today s high-speed networks. The second hardware NPS approach [4] [] tends to store all signature data on-chip. These NPSs store some or all of the data on on-chip memory []. The data can also be stored partially on the on-chip logic. On-chip logic requires reconfiguration each time a new signature is added. This is a much slower process compared to off-chip memory updates and requires 343

2 taking the NPS off-line and leaving the network vulnerable to any attack during the update. Note that our design can fit signature data to a fraction of the on-chip memory, so that no external memory or reconfiguration is needed. III. PROBLEM DEFINITION Let s assume that there is a set S of signatures, and we d like to detect if any of these signatures appear in the input (i.e., input traffic). A fixed-length sliding window is slid over the input and for each location, one string matching operation is performed to detect signatures. Let s denote the number of signatures in S with n and assume that all signatures in S have a fixed-length of L. Obviously, actual intrusion signature lengths are not uniform (i.e., different signatures have different lengths) and we will address this issue later in the paper. A hash-table [2] can be used to implement such a string matching system as follows. First, all signatures are inserted into a hash-table. Every time the input window is slid, the content of the window is hashed. The hash output is used to retrieve the signature in the corresponding location in the hash-table. This signature is compared with the content of the input window to see if the input actually contains this traffic. Unfortunately, the hash-tables are not perfect. Even with low load factors (γ), collisions are expected. This means one bin may be allocated by more than one signature and each of these signatures should be compared with the content of the input window until a match or no match is found. Although it can be shown hash-tables have O() average lookup performance, their worst-case performance can go up to O(n). If the hashtable is not designed carefully, an attacker may force a hashtable to operate at the worst case by applying crafted traffic that will cause system degradation and eventually denial-ofservice for the detection system [3]. IV. BASIC DATA STRUCTURE As described above, hash-tables addressed with ordinary hash functions have two issues: () Collisions are inevitable, thus worst-case performance is not good. (2) To reduce collisions, more memory should be used. If a special class of hash functions, called perfect hash functions, is used to address the hash-table, then collisions can be avoided altogether, yet the memory requirement is still larger than n, in general. A special class of perfect hash functions, called minimal perfect hash functions, guarantees collision-free hashing for a given set with n items using a memory of n slots. Recently, we proposed a minimal hash function suitable for hardware implementation []. Here, we briefly summarize our minimal perfect hash function. The main goal of a minimal perfect hash function is to map a set of n items to a memory with n slots without any collisions. The key idea of our approach is to use a binary trie as an address decoder to reach this goal, as shown in Figure. A balanced, fully loaded binary trie, as shown in Figure with l = log(n) levels has 2 l = n unique paths from its root All logarithms in this paper are in base 2. log(n) levels Addr= Fig.. b b 2 b 3 b 4 b 5 b 6 b 7 b 4 b 5 b 6 b 7 b b 2 b 3 0 b 7 b 6 b 5 b 4 b 3 b 2 b b 7 b 6 b 5 b 4 b 3 b 2 b 00 Binary trie as address decoder node to any of its 2 l leaf nodes 2. Each of these unique paths can be represented with an l-bit label, which then can be used as the address of each memory location. This l-bit label can be retrieved while traversing the trie from the root to the leaves. At each node, based on whether the next node in the path is the left or right child, the next significant bit of the label will be zero or one, respectively. To use this trie as an address decoder for the input set, let s start by putting all the items in set S into the root node of the trie. Then, partition the items into two equally sized groups by putting half of the items to the left child node and the remaining to the right child node. If this operation is repeated for all nodes until a leaf node is reached, each item in the set will be on a unique path from root to leaves. This path s label is the address of this item in the memory. It is not straightforward to partition the items equally at each step. Actually, this problem is equivalent to the classical number partitioning problem and it is NP-complete. In [] we showed partitioning algorithms to achieve this goal. In this paper, we will not show the details of these partitioning algorithms; instead, we summarize the resulting data structure to realize the binary trie that allows equal partitioning. The data structure for an 8-item set is shown in Figure 2. The programming of this trie to the data structure is carried out as follows. Each level of the trie is implemented as two bitmaps. One hash function is used for each level. Items are first hashed using the hash function of the level. The resulting bit in the first bitmap of the level, the Data Bitmap (DB), is set to. When all items are written to a level, the items are partitioned into two equal-sized groups by the partitioning algorithm. If an item is partitioned to the left group, the bit corresponding to this item (i.e., bit at the address pointed by the hash result) in the second bitmap (Next Node Bitmap 2 If n is not a power of two, the trie won t be balanced. Then, l = log(n) levels has 2n >2 l =2 log(n) n unique paths from its root node to any of its leaves. While the trie is not balanced, the memory will be left aligned, thus, still providing the minimum perfect hash property. 344

3 b 6 b 5 b 4 b Path Determines address 2 b 7 b 3 b 0 0 out of the four nodes represented by the 2 bits in each NB bin. H b 7 b 6 b 5 b 4 b 3 b 2 b 0 H 0 Aggregate 2 3 b 7 b 6 b 5 b 4 b 3 b 2 b H H2 0 Node 0 Node Node 2 Node 3 Node 0 Node Node 2 Node 3 b 7 b 6 b 5 b 4 b 3 b 2 b Address=0000 Fig. 2. Data structure for the binary trie (NB)) is set to 0 to show the next node is the left node. Similarly, items that belong to the second group are denoted by a corresponding to their location in the NB. This operation is replicated for each level. When the items are programmed, the system is ready for queries. Figure 2 also shows an example query where item b 3 is queried. The item is hashed and queried at each level starting from the root level. If the corresponding location in DB is set to, the NB value determines the next node (left or right). If the corresponding location in DB is set to 0, this means this item is not in this set and the query returns a no match. V. IMPROVEMENTS TO THE BASIC DATA STRUCTURE A. Aggregated Levels The basic TriBiCa data structure uses a binary trie with log(n) levels where at each level, the items in each node are divided into two equally sized groups. TriBiCa can be generalized to use a k-ary trie where each node has k child nodes and the items in each node are divided into k equally sized groups (k 2 and k may also differ between levels). In this section, we investigate this k-ary trie option for TriBiCa and we show that this option reduces the memory required and increases scalability. One way to achieve a k-ary trie for k>2 is to aggregate 3 multiple levels into a single level as shown in Figure 3. When levels are aggregated into a single level, all path decisions corresponding to the original levels can be done in the single aggregated level by referring to the single aggregated NB of this node. For instance in Figure 3, at each level only one address bit is revealed before aggregation. Thus, to choose the child node out of the four leaf nodes, two levels are required. After aggregation, one level is enough to choose the next node 3 Aggregation only allows k values that are a power of two, which is still suitable for simple addressing using the path in the trie. Note that it is also trivial to have nodes with arbitrary k values (e.g., k =3) but then the path cannot be used for simple addressing. Fig. 3. Level aggregation. Four points are noteworthy for aggregated levels: () A single hash function is used to address the bitmaps. (2) Each NB bin has log(k) bits to represent k different children. (3) The number of levels is reduced by log(k). (4) The DBs are merged and not aggregated, i.e., the aggregated node has a single DB. For small data sets, the efficient structure of TriBiCa levels makes them too small for typical on-chip memory unit sizes. As a result, the number of memory units that can be accessed concurrently (i.e., Block RAMs (BRs)), rather than the total memory size, determines the scalability. Aggregating levels allows multiple levels to be packed together and accessed in one memory access, which increases the scalability of TriBiCa. For instance, the basic structure with two levels requires two memory accesses/lookups, whereas the aggregated node in Figure 3 requires only one access. Although the logic is vast, reduction of hash functions can improve scalability for chips with very limited logic resources. Since, the aggregated levels share the same DB, the total DB memory is reduced. For instance, a level with m bins requires a total of 2 m bits for DB and NB. In the basic data structure, l such levels require 2 l m bits. However, if these l levels are aggregated they will share a single DB, thus reducing the memory requirement to (l +) m bits. B. Compressed Low-Nodes The hash-bitmap node structure of the basic TriBiCa is a space-efficient way to locate items in a node quickly without any search through the items in the bitmap. As we go down in the trie, the number of items per node is reduced. When the number of items in a node is small, searching through these items in parallel is manageable without incurring any time penalty. When the number of items is small and searching is done in parallel, it is more efficient to store only the location of these items in these nodes, rather than keeping the entire bitmap. This is because, as we go down in the trie, the number of items per node and the size of the bitmap get smaller. Thus the number of locations to store and the size of each location are reduced. Based on this observation, we propose a new space-efficient representation scheme for these low-nodes. Here, we define low-nodes as nodes that belong to one of the few bottom levels of the trie. For instance, the node given in the left of Figure 4 has two items and the bitmaps occupy 345

4 a total memory of eight bits. However, if only the locations (i.e., hash results) for the two items in this node are stored, this takes four bits in total. This compression reduces the required memory for this node by half. If all items are represented by their locations in the bitmap, a memory of n log(m) bits is required. In general, for a node where n log(m) < 2 m and n is not too high, so that matching all items in parallel is manageable on hardware, this compression scheme can be used. 8 bits in total I q L L 2 L 3 L 4 Fig. 5. Hash b b Fig. 4. L q Compress 4 bits in total Compression for low nodes. 2- Encoder 0 0 b Addr Query circuit for a compressed low-node with 4 items. Querying compressed nodes requires more care than the uncompressed scheme (address comparators rather than simple bit value test (0 or )). However, the circuit to achieve this goal is still very simple as can be seen from Figure 5, which shows a query circuit for a 4-item node. The query input, I q is first hashed to determine its location, L q. Then, this location is compared in parallel with the locations of the items stored in this node, L L 4. If any of the top two comparators gives a match, then this means the item belongs to the left child node. If any of the bottom two comparators give a match, then this means the item belongs to the right child node. The 2- decoder converts these two match values into a single bit address value (to left child or right child). If no comparators gives a match, then this item is not in the set S and can safely be discarded. Two items in the same group can be in thesamebin(e.g., L = L 2 is possible), however two items in different groups cannot be in the same bin (e.g., L 2 = L 3 is not possible) so at most one group can give a match as required. VI. DETECTING LONG SIGNATURES So far, we assumed that each item in S perfectly fits into each memory slot. In reality, this is not always guaranteed. For instance, in the intrusion signature database of Snort [4], signature sizes vary between to 22 bytes. To fit varying length items into a fixed size memory, an indirect addressing can be used. In indirect addressing, fixed size pointers to actual items are stored. This approach suffers from additional memory usage for pointer storage and increased memory access (one for the pointer and one for the actual item). Another approach is to divide the items into fixed size items to form a new set S. Then S can perfectly fit into the memory slots. The items in S can then be statefully constructed back when needed. In this approach, the operation is carried out in two steps. In the first step, fixed-size signatures are detected using the data structure. If there is a match, an corresponding to the signature is generated. Let s assume the fixed signature size is four bytes. If two s are detected four bytes apart, these may constitute an eight-byte prefix of a signature or the signature itself. To detect these long signatures, the two s detected are applied to a second detector that is also based on our data structure. The only difference is this detector detects pairs rather than fixed-size signatures. A signature does not necessarily have a size multiple of four bytes. But any signature with size more than 4-bytes can be divided into a prefix that has a length multiple of four bytes and a suffix that is up to four bytes. This observation allows a simple scheme to detect signatures with any length. Until the suffix is reached, the prefix of the signature is detected using the two detectors described above. For each suffix size (less than four bytes), separate detectors are used. The suffixes are also detected in two steps. In the first step, the suffixes are detected as one- to three-byte strings. If there is a match, an is generated. This is combined with the from the stateful detector and applied to the corresponding suffix detector to get a complete match. The whole engine is shown in Figure 6. The -3 byte detectors also detect signatures of size -3 bytes. Data In 32b 32b 24b 6b 8b 4-byte 3-byte 2-byte -byte Stateful State 3-byte suffix detector 2-byte suffix detector -byte suffix detector Queue es Fig. 6. Detection engine that consists of multiple detectors and detects signatures with all lengths. Signature detection is done in two steps. Short suffixes are detected separately. Each detector is further divided into two stages. The first stage is the minimal perfect hashing based address decoder that addresses the second stage, which is a memory where the 346

5 signatures (or pairs) are stored. Each detector is pipelined to guarantee one query per clock cycle. VII. IMPLEMENTATION TABLE I BLOCK RAM (BR) USAGE FOR ONE ENGINE # of levels Trie BR SigMem BR 4-byte Stateful byte byte suffix byte byte suffix 3 3 -byte byte suffix 3 3 Fig. 7. Architecture of the NPS The overall architecture of the NPS is shown in Figure 7. The incoming packets are distributed evenly among multiple packet queues, where each queue is served by one Detection Engine. If an engine detects a signature (i.e., finds a match), then the of this signature is passed to the Alert Generator. The alert generator issues UDP alert packets that show the information about the malicious packet (5-tuple and time stamp) and the signature(s) detected in this packet. These packets are sent to an alert database for further processing. In addition to the hardware, various software tools are developed for TriBiCa. Most notably, a tool for mapping signatures (generic signatures or Snort signatures) into TriBiCa is developed. Given a signature set with varying sizes, the tool first chops the signatures into fixed size chunks of size c = 4 bytes. The tool also identifies the short signatures and suffixes (i.e., signatures and suffixes with size less than c bytes). Next, to detect full signatures, the tool generates state tables to be programmed into the stateful detector and suffix detectors. Then, the tool maps the signatures, suffixes and state tables into their respective TriBiCas. Although, the focus here is on the application of TriBiCa on NPS, TriBiCa can also be applied to different applications. The developed tool also has a separate module to generate VHDL files for generating TriBiCa architectures with various parameters (e.g., number of levels, memory sizes, number of children, etc.). A simple simulator is also developed to simulate TriBiCa data structure on software with simple queries. Finally, for testing basic hardware functionality a simple database and web server is developed to store and view the alerts generated by the NPS. A. Memory and Performance The Block RAM usage of each engine for Snort 2.4 signatures is shown in Table I 4. Each row corresponds to one of the detectors in Figure 6. The second column shows the number of trie levels allocated for each detector. The third column shows the memory requirements of these tries in terms of Block RAMs (BRs) occupied. The last column shows the BR requirement for the memory where the actual signatures and states are stored. For 2- and 3-byte detectors, the number of fixed-size signatures to store is very low. A simple hash-table having two items per bin using one and two BRs, respectively is enough. Reading two items in parallel from these hash tables guarantees the worst case for these small sets, making it unnecessary to further optimize. So, we did not attempt to use the data structure for these small sets. For -byte detector, since there can be up to 256 -byte entries and they can be stored in a small bitmap, no BR is used for this set either [5]. From the table, each engine requires 43 BRs in total. Note that out of these 43 total BRs used, the 22 BRs in the last column of Table I are used to store the actual signatures and states for the stateful detectors. Since the FPGA used has 36 BRs in total, three such engines can fit into a single FPGA. To accommodate packet queues, other buffers necessary for Ethernet and alert generator, and for future expansion, we left one of these engines out and designed our system with two engines. Each engine can reach up to 300 MHz speed and can process 8 bits of input for each clock cycle, resulting in 2.4-Gbps throughput. Note that since the FPGA used for the design (as well as most of the modern FPGAs) has dual-port BRs, this single engine can process two 8 bit inputs at the same time, doubling the throughput for the same amount of memory, giving a total throughput of 9.6 Gbps. As a result, this design achieves the same throughput using 28% less memory compared to the basic TriBiCa design []. B. Testing the NPS To test the proposed system, a two-engine reduced-speed system operating at Gbps was designed. The design is implemented on a Xilinx Virtex 2 Pro FPGA. The test setup is shown in Figure 8. A Spirent - AX4000, -Gbps Ethernet Traffic Generator is used as the packet generator, which is used to apply a mix of clean and malicious traffic at full line speed. The alerts generated by the NPS are sent to a database 4 Note that the trie is sized to accommodate more signatures compared to the actual Snort signature set to allow further updates. 347

6 server, where these alerts are stored. A web interface allows users to query this database. In this setup, NPS can support full line rate and the main bottleneck for the whole system is the database server running on a general purpose CPU. Fig. 8. Test setup VIII. CONCLUSION In this paper, we presented the implementation of a 0- Gbps Network Intrusion Detection and Prevention System. The system does not use any external memory and is completely contained within a single commodity FPGA. We also implemented and tested a proof-of-concept system with - Gbps traffic. A software tool to map intrusion signatures to the proposed data structure as well as a database to store, and a web server to display the intrusion alerts from the NPS, were also developed for this system. This work focuses on detection of exact signatures contained in a single packet. We previously proposed a method to detect signatures spanning multiple packets [5]. As future work, we d like extend the approach in this paper to detect signatures over multiple packets and support more complex signature types such as signatures with wildcards. REFERENCES [] N. S. Artan and H. J. Chao, TriBiCa: Trie bitmap content analyzer for high-speed network intrusion detection. in 26th Annual IEEE Conference on Computer Communications (INFOCOM), 2007, pp [2] F. Yu, T. Lakshman, and R. Katz, Gigabit rate pattern-matching using TCAM, in Int. Conf. on Network Protocols (ICNP), Berlin, Germany, Oct [3] H. Song and J. Lockwood, Multi-pattern signature matching for hardware network intrusion detection systems, in IEEE Globecom 2005, Nov-Dec [4] C. Clark and D. Schimmel, Scalable pattern matching for highspeed networks, in IEEE Symposium on Field-Programmable Custom Computing Machines (FCCM), Napa, California, 2004, pp [5] Y. H. Cho and W. H. Mangione-Smith, Fast reconfiguring deep packet filter for + gigabit network. in FCCM, 2005, pp [6] Z. K. Baker and V. K. Prasanna, High-throughput linked-pattern matching for intrusion detection systems, in Proceedings of the First Annual ACM Symposium on Architectures for Networking and Communications Systems, [7] J. Moscola, J. Lockwood, R. P. Loui, and M. Pachos, Implementation of a content-scanning module for an Internet firewall. in FCCM, 2003, pp [8] I. Sourdis, D. Pnevmatikatos, S. Wong, and S. Vassiliadis, A reconfigurable perfect-hashing scheme for packet inspection, in Proc. 5th International Conference on Field Programmable Logic and Applications (FPL 2005), Aug. 2005, pp [9] L. Tan and T. Sherwood, Architectures for bit-split string scanning in intrusion detection, IEEE Micro, Jan-Feb [0] G. Papadopoulos and D. N. Pnevmatikatos, Hashing + memory = low cost, exact pattern matching. in Proc.5th International Conference on Field Programmable Logic and Applications (FPL), Aug. 2005, pp [] Y. Lu, B. Prabhakar, and F. Bonomi, Perfect hashing for network applications, in IEEE Symposium on Information Theory), Seattle, WA, 2006, pp [2] T. Cormen, C. Leiserson, and R. Rivest, Introduction to Algorithms. The MIT Press, 200. [3] S. Crosby and D. Wallach, Denial of service via algorithmic complexity attacks, in Proceedings of the 2th USENIX Security Symposium, Aug [4] [Online]. Available: [5] N. S. Artan and H. J. Chao, Design and analysis of a multi-packet signature detection system, Int. J. Security and Networks, vol. 2, no. /2,

A Fast Pattern-Matching Algorithm for Network Intrusion Detection System

A Fast Pattern-Matching Algorithm for Network Intrusion Detection System A Fast Pattern-Matching Algorithm for Network Intrusion Detection System Jung-Sik Sung 1, Seok-Min Kang 2, Taeck-Geun Kwon 2 1 ETRI, 161 Gajeong-dong, Yuseong-gu, Daejeon, 305-700, Korea jssung@etri.re.kr

More information

Aggregated Bloom Filters For Intrusion Detection And Prevention Hardware

Aggregated Bloom Filters For Intrusion Detection And Prevention Hardware Aggregated Bloom Filters For Intrusion Detection And Prevention Hardware N. Sertac Artan, Kaustubh Sinkar, Jalpa Patel, and H. Jonathan Chao Department of Electrical and Computer Engineering Polytechnic

More information

BITWISE OPTIMISED CAM FOR NETWORK INTRUSION DETECTION SYSTEMS. Sherif Yusuf and Wayne Luk

BITWISE OPTIMISED CAM FOR NETWORK INTRUSION DETECTION SYSTEMS. Sherif Yusuf and Wayne Luk BITWISE OPTIMISED CAM FOR NETWORK INTRUSION DETECTION SYSTEMS Sherif Yusuf and Wayne Luk Department of Computing, Imperial College London, 180 Queen s Gate, London SW7 2BZ email: {sherif.yusuf, w.luk}@imperial.ac.uk

More information

DRAFT 18-09-2003. 2.1 Gigabit network intrusion detection systems

DRAFT 18-09-2003. 2.1 Gigabit network intrusion detection systems An Intrusion Detection System for Gigabit Networks (Working paper: describing ongoing work) Gerald Tripp Computing Laboratory, University of Kent. CT2 7NF. UK e-mail: G.E.W.Tripp@kent.ac.uk This draft

More information

Configurable String Matching Hardware for Speeding up Intrusion Detection. Monther Aldwairi*, Thomas Conte, Paul Franzon

Configurable String Matching Hardware for Speeding up Intrusion Detection. Monther Aldwairi*, Thomas Conte, Paul Franzon Configurable String Matching Hardware for Speeding up Intrusion Detection Monther Aldwairi*, Thomas Conte, Paul Franzon Department of Electrical and Computer Engineering, North Carolina State University,

More information

NETWORK INTRUSION DETECTION SYSTEMS ON FPGAS WITH ON-CHIP NETWORK INTERFACES

NETWORK INTRUSION DETECTION SYSTEMS ON FPGAS WITH ON-CHIP NETWORK INTERFACES NETWORK INTRUSION DETECTION SYSTEMS ON FPGAS WITH ON-CHIP NETWORK INTERFACES Christopher R. Clark Georgia Institute of Technology Atlanta, Georgia, U.S.A. cclark@ece.gatech.edu Craig D. Ulmer Sandia National

More information

UNITE: Uniform hardware-based Network Intrusion detection Engine

UNITE: Uniform hardware-based Network Intrusion detection Engine UNITE: Uniform hardware-based Network Intrusion detection Engine S. Yusuf and W. Luk and M. K. N. Szeto and W. Osborne Department of Computing, Imperial College London, 180 Queen s Gate, London SW7 2BZ

More information

An Extensible, System-On-Programmable-Chip, Content-Aware Internet Firewall

An Extensible, System-On-Programmable-Chip, Content-Aware Internet Firewall An Extensible, System-On-Programmable-Chip, Content-Aware Internet Firewall John W. Lockwood, Christopher Neely, Christopher Zuver, James Moscola, Sarang Dharmapurikar, and David Lim Applied Research Laboratory

More information

Reconfigurable Architecture Requirements for Co-Designed Virtual Machines

Reconfigurable Architecture Requirements for Co-Designed Virtual Machines Reconfigurable Architecture Requirements for Co-Designed Virtual Machines Kenneth B. Kent University of New Brunswick Faculty of Computer Science Fredericton, New Brunswick, Canada ken@unb.ca Micaela Serra

More information

Exploiting Stateful Inspection of Network Security in Reconfigurable Hardware

Exploiting Stateful Inspection of Network Security in Reconfigurable Hardware Exploiting Stateful Inspection of Network Security in Reconfigurable Hardware Shaomeng Li, Jim Tørresen, Oddvar Søråsen Department of Informatics University of Oslo N-0316 Oslo, Norway {shaomenl, jimtoer,

More information

Optimising the resource utilisation in high-speed network intrusion detection systems.

Optimising the resource utilisation in high-speed network intrusion detection systems. Optimising the resource utilisation in high-speed network intrusion detection systems. Gerald Tripp www.kent.ac.uk Network intrusion detection Network intrusion detection systems are provided to detect

More information

SMALL INDEX LARGE INDEX (SILT)

SMALL INDEX LARGE INDEX (SILT) Wayne State University ECE 7650: Scalable and Secure Internet Services and Architecture SMALL INDEX LARGE INDEX (SILT) A Memory Efficient High Performance Key Value Store QA REPORT Instructor: Dr. Song

More information

International Journal of Scientific & Engineering Research, Volume 4, Issue 8, August-2013 1300 ISSN 2229-5518

International Journal of Scientific & Engineering Research, Volume 4, Issue 8, August-2013 1300 ISSN 2229-5518 International Journal of Scientific & Engineering Research, Volume 4, Issue 8, August-2013 1300 Efficient Packet Filtering for Stateful Firewall using the Geometric Efficient Matching Algorithm. Shriya.A.

More information

FPGA area allocation for parallel C applications

FPGA area allocation for parallel C applications 1 FPGA area allocation for parallel C applications Vlad-Mihai Sima, Elena Moscu Panainte, Koen Bertels Computer Engineering Faculty of Electrical Engineering, Mathematics and Computer Science Delft University

More information

Pattern Matching In High Bandwidth Network

Pattern Matching In High Bandwidth Network A Pattern Matching Co processor for Network Security Young H. Cho and William H. Mangione Smith University of California, Los Angeles Department of Electrical Engineering Los Angeles, California young,billms@ee.ucla.edu

More information

respectively. Section IX concludes the paper.

respectively. Section IX concludes the paper. 1 Fast and Scalable Pattern Matching for Network Intrusion Detection Systems Sarang Dharmapurikar, and John Lockwood, Member IEEE Abstract High-speed packet content inspection and filtering devices rely

More information

Open Flow Controller and Switch Datasheet

Open Flow Controller and Switch Datasheet Open Flow Controller and Switch Datasheet California State University Chico Alan Braithwaite Spring 2013 Block Diagram Figure 1. High Level Block Diagram The project will consist of a network development

More information

Vulnerability Analysis of Hash Tables to Sophisticated DDoS Attacks

Vulnerability Analysis of Hash Tables to Sophisticated DDoS Attacks International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 12 (2014), pp. 1167-1173 International Research Publications House http://www. irphouse.com Vulnerability

More information

CHAPTER 5 FINITE STATE MACHINE FOR LOOKUP ENGINE

CHAPTER 5 FINITE STATE MACHINE FOR LOOKUP ENGINE CHAPTER 5 71 FINITE STATE MACHINE FOR LOOKUP ENGINE 5.1 INTRODUCTION Finite State Machines (FSMs) are important components of digital systems. Therefore, techniques for area efficiency and fast implementation

More information

Aho-Corasick FSM Implementation for

Aho-Corasick FSM Implementation for A Memory-Efficient Reconfigurable Aho-Corasick FSM Implementation for Intrusion Detection Systems Vassilis Dimopoulos*, Joannis Papaefstathiou* and Dionisios Pnevmatikatost* Electronic and Computer Engineering

More information

Extensible Network Configuration and Communication Framework

Extensible Network Configuration and Communication Framework Extensible Network Configuration and Communication Framework Todd Sproull and John Lockwood Applied Research Laboratory Department of Computer Science and Engineering: Washington University in Saint Louis

More information

Scalable Prefix Matching for Internet Packet Forwarding

Scalable Prefix Matching for Internet Packet Forwarding Scalable Prefix Matching for Internet Packet Forwarding Marcel Waldvogel Computer Engineering and Networks Laboratory Institut für Technische Informatik und Kommunikationsnetze Background Internet growth

More information

Network Intrusion Detection Systems - A Recent Survey

Network Intrusion Detection Systems - A Recent Survey A Recent Survey on Bloom Filters in Network Intrusion Detection Systems K.Saravanan #, Dr.A.Senthil kumar *2, J.S.Dolian #3 #&3 Department of Electronics & Communication, Karunya University, Cbe, India.

More information

IP address lookup for Internet routers using cache routing table

IP address lookup for Internet routers using cache routing table ISSN (Print): 1694 0814 35 IP address lookup for Internet routers using cache routing table Houassi Hichem 1 and Bilami Azeddine 2 1 Department of Computer Science, University Center of Khenchela, Algeria

More information

Two-phase Pattern Matching for Regular Expressions in Intrusion Detection Systems

Two-phase Pattern Matching for Regular Expressions in Intrusion Detection Systems JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 26, 1563-1582 (2010) Two-phase Pattern Matching for Regular Expressions in Intrusion Detection Systems Department of Electrical Engineering National Taiwan

More information

Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks

Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks Prashil S. Waghmare PG student, Sinhgad College of Engineering, Vadgaon, Pune University, Maharashtra, India. prashil.waghmare14@gmail.com

More information

Performance Oriented Management System for Reconfigurable Network Appliances

Performance Oriented Management System for Reconfigurable Network Appliances Performance Oriented Management System for Reconfigurable Network Appliances Hiroki Matsutani, Ryuji Wakikawa, Koshiro Mitsuya and Jun Murai Faculty of Environmental Information, Keio University Graduate

More information

Classifying DDoS packets in high-speed networks

Classifying DDoS packets in high-speed networks IJCSNS International Journal of Computer Science and Network Security, Vol. 6, No. 2B, February 26 7 Classifying DDoS packets in high-speed networks Yang Xiang and Wanlei Zhou School of Engineering and

More information

Big Data Technology Map-Reduce Motivation: Indexing in Search Engines

Big Data Technology Map-Reduce Motivation: Indexing in Search Engines Big Data Technology Map-Reduce Motivation: Indexing in Search Engines Edward Bortnikov & Ronny Lempel Yahoo Labs, Haifa Indexing in Search Engines Information Retrieval s two main stages: Indexing process

More information

Compiling PCRE to FPGA for Accelerating SNORT IDS

Compiling PCRE to FPGA for Accelerating SNORT IDS Compiling PCRE to FPGA for Accelerating SNORT IDS Abhishek Mitra Walid Najjar Laxmi N Bhuyan QuickTime and a QuickTime and a decompressor decompressor are needed to see this picture. are needed to see

More information

Index Terms Domain name, Firewall, Packet, Phishing, URL.

Index Terms Domain name, Firewall, Packet, Phishing, URL. BDD for Implementation of Packet Filter Firewall and Detecting Phishing Websites Naresh Shende Vidyalankar Institute of Technology Prof. S. K. Shinde Lokmanya Tilak College of Engineering Abstract Packet

More information

NetFlow probe on NetFPGA

NetFlow probe on NetFPGA Verze #1.00, 2008-12-12 NetFlow probe on NetFPGA Introduction With ever-growing volume of data being transferred over the Internet, the need for reliable monitoring becomes more urgent. Monitoring devices

More information

MAXIMIZING RESTORABLE THROUGHPUT IN MPLS NETWORKS

MAXIMIZING RESTORABLE THROUGHPUT IN MPLS NETWORKS MAXIMIZING RESTORABLE THROUGHPUT IN MPLS NETWORKS 1 M.LAKSHMI, 2 N.LAKSHMI 1 Assitant Professor, Dept.of.Computer science, MCC college.pattukottai. 2 Research Scholar, Dept.of.Computer science, MCC college.pattukottai.

More information

Bricata Next Generation Intrusion Prevention System A New, Evolved Breed of Threat Mitigation

Bricata Next Generation Intrusion Prevention System A New, Evolved Breed of Threat Mitigation Bricata Next Generation Intrusion Prevention System A New, Evolved Breed of Threat Mitigation Iain Davison Chief Technology Officer Bricata, LLC WWW.BRICATA.COM The Need for Multi-Threaded, Multi-Core

More information

Network Function Virtualization based on FPGAs: A Framework for all-programmable network devices

Network Function Virtualization based on FPGAs: A Framework for all-programmable network devices Network Function Virtualization based on FPGAs: A Framework for all-programmable network devices Christoforos Kachris, Georgios Sirakoulis Electrical and Computer Engineering Department Democritus University

More information

CUSTOMER RELATIONSHIP MANAGEMENT SYSTEM

CUSTOMER RELATIONSHIP MANAGEMENT SYSTEM CUSTOMER RELATIONSHIP MANAGEMENT SYSTEM 1 G.VIJAY, 2 S.PORKAMALAM 1 Assitant Professor, Dept.of.Computer science, MCC college.pattukottai. 2 Research Scholar, Dept.of.Computer science, MCC college.pattukottai.

More information

CS 91: Cloud Systems & Datacenter Networks Networks Background

CS 91: Cloud Systems & Datacenter Networks Networks Background CS 91: Cloud Systems & Datacenter Networks Networks Background Walrus / Bucket Agenda Overview of tradibonal network topologies IntroducBon to soeware- defined networks Layering and terminology Topology

More information

Implementation of Full -Parallelism AES Encryption and Decryption

Implementation of Full -Parallelism AES Encryption and Decryption Implementation of Full -Parallelism AES Encryption and Decryption M.Anto Merline M.E-Commuication Systems, ECE Department K.Ramakrishnan College of Engineering-Samayapuram, Trichy. Abstract-Advanced Encryption

More information

Design and Implementation of an On-Chip timing based Permutation Network for Multiprocessor system on Chip

Design and Implementation of an On-Chip timing based Permutation Network for Multiprocessor system on Chip Design and Implementation of an On-Chip timing based Permutation Network for Multiprocessor system on Chip Ms Lavanya Thunuguntla 1, Saritha Sapa 2 1 Associate Professor, Department of ECE, HITAM, Telangana

More information

Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP

Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP Aakanksha Vijay M.tech, Department of Computer Science Suresh Gyan Vihar University Jaipur, India Mrs Savita Shiwani Head Of

More information

基 於 SDN 與 可 程 式 化 硬 體 架 構 之 雲 端 網 路 系 統 交 換 器

基 於 SDN 與 可 程 式 化 硬 體 架 構 之 雲 端 網 路 系 統 交 換 器 基 於 SDN 與 可 程 式 化 硬 體 架 構 之 雲 端 網 路 系 統 交 換 器 楊 竹 星 教 授 國 立 成 功 大 學 電 機 工 程 學 系 Outline Introduction OpenFlow NetFPGA OpenFlow Switch on NetFPGA Development Cases Conclusion 2 Introduction With the proposal

More information

ProTrack: A Simple Provenance-tracking Filesystem

ProTrack: A Simple Provenance-tracking Filesystem ProTrack: A Simple Provenance-tracking Filesystem Somak Das Department of Electrical Engineering and Computer Science Massachusetts Institute of Technology das@mit.edu Abstract Provenance describes a file

More information

SPP-NIDS - A Sea of Processors Platform for Network Intrusion Detection Systems

SPP-NIDS - A Sea of Processors Platform for Network Intrusion Detection Systems SPP-NIDS - A Sea of Processors Platform for Network Intrusion Detection Systems Luís Carlos Caruso, Guilherme Guindani, Hugo Schmitt, Ney Calazans, Fernando Moraes Faculdade de Informática PUCRS Av. Ipiranga

More information

Stateful Inspection Firewall Session Table Processing

Stateful Inspection Firewall Session Table Processing International Journal of Information Technology, Vol. 11 No. 2 Xin Li, ZhenZhou Ji, and MingZeng Hu School of Computer Science and Technology Harbin Institute of Technology 92 West Da Zhi St. Harbin, China

More information

Enhance Service Delivery and Accelerate Financial Applications with Consolidated Market Data

Enhance Service Delivery and Accelerate Financial Applications with Consolidated Market Data White Paper Enhance Service Delivery and Accelerate Financial Applications with Consolidated Market Data What You Will Learn Financial market technology is advancing at a rapid pace. The integration of

More information

In-Memory Databases Algorithms and Data Structures on Modern Hardware. Martin Faust David Schwalb Jens Krüger Jürgen Müller

In-Memory Databases Algorithms and Data Structures on Modern Hardware. Martin Faust David Schwalb Jens Krüger Jürgen Müller In-Memory Databases Algorithms and Data Structures on Modern Hardware Martin Faust David Schwalb Jens Krüger Jürgen Müller The Free Lunch Is Over 2 Number of transistors per CPU increases Clock frequency

More information

IDENTIFYING AND OPTIMIZING DATA DUPLICATION BY EFFICIENT MEMORY ALLOCATION IN REPOSITORY BY SINGLE INSTANCE STORAGE

IDENTIFYING AND OPTIMIZING DATA DUPLICATION BY EFFICIENT MEMORY ALLOCATION IN REPOSITORY BY SINGLE INSTANCE STORAGE IDENTIFYING AND OPTIMIZING DATA DUPLICATION BY EFFICIENT MEMORY ALLOCATION IN REPOSITORY BY SINGLE INSTANCE STORAGE 1 M.PRADEEP RAJA, 2 R.C SANTHOSH KUMAR, 3 P.KIRUTHIGA, 4 V. LOGESHWARI 1,2,3 Student,

More information

IP Address Lookup Using A Dynamic Hash Function

IP Address Lookup Using A Dynamic Hash Function IP Address Lookup Using A Dynamic Hash Function Xiaojun Nie David J. Wilson Jerome Cornet Gerard Damm Yiqiang Zhao Carleton University Alcatel Alcatel Alcatel Carleton University xnie@math.carleton.ca

More information

MIDeA: A Multi-Parallel Intrusion Detection Architecture

MIDeA: A Multi-Parallel Intrusion Detection Architecture MIDeA: A Multi-Parallel Intrusion Detection Architecture Giorgos Vasiliadis, FORTH-ICS, Greece Michalis Polychronakis, Columbia U., USA Sotiris Ioannidis, FORTH-ICS, Greece CCS 2011, 19 October 2011 Network

More information

Concurrent Round-Robin-Based Dispatching Schemes for Clos-Network Switches

Concurrent Round-Robin-Based Dispatching Schemes for Clos-Network Switches 830 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 10, NO. 6, DECEMBER 2002 Concurrent Round-Robin-Based Dispatching Schemes for Clos-Network Switches Eiji Oki, Member, IEEE, Zhigang Jing, Member, IEEE, Roberto

More information

Efficient IP-Address Lookup with a Shared Forwarding Table for Multiple Virtual Routers

Efficient IP-Address Lookup with a Shared Forwarding Table for Multiple Virtual Routers Efficient IP-Address Lookup with a Shared Forwarding Table for Multiple Virtual Routers ABSTRACT Jing Fu KTH, Royal Institute of Technology Stockholm, Sweden jing@kth.se Virtual routers are a promising

More information

Accelerate Cloud Computing with the Xilinx Zynq SoC

Accelerate Cloud Computing with the Xilinx Zynq SoC X C E L L E N C E I N N E W A P P L I C AT I O N S Accelerate Cloud Computing with the Xilinx Zynq SoC A novel reconfigurable hardware accelerator speeds the processing of applications based on the MapReduce

More information

Monitoring Large Flows in Network

Monitoring Large Flows in Network Monitoring Large Flows in Network Jing Li, Chengchen Hu, Bin Liu Department of Computer Science and Technology, Tsinghua University Beijing, P. R. China, 100084 { l-j02, hucc03 }@mails.tsinghua.edu.cn,

More information

Efficient Iceberg Query Evaluation for Structured Data using Bitmap Indices

Efficient Iceberg Query Evaluation for Structured Data using Bitmap Indices Proc. of Int. Conf. on Advances in Computer Science, AETACS Efficient Iceberg Query Evaluation for Structured Data using Bitmap Indices Ms.Archana G.Narawade a, Mrs.Vaishali Kolhe b a PG student, D.Y.Patil

More information

High-Performance IP Service Node with Layer 4 to 7 Packet Processing Features

High-Performance IP Service Node with Layer 4 to 7 Packet Processing Features UDC 621.395.31:681.3 High-Performance IP Service Node with Layer 4 to 7 Packet Processing Features VTsuneo Katsuyama VAkira Hakata VMasafumi Katoh VAkira Takeyama (Manuscript received February 27, 2001)

More information

FORWARDING of Internet Protocol (IP) packets is the primary. Scalable IP Lookup for Internet Routers

FORWARDING of Internet Protocol (IP) packets is the primary. Scalable IP Lookup for Internet Routers Scalable IP Lookup for Internet Routers David E. Taylor, Jonathan S. Turner, John W. Lockwood, Todd S. Sproull, David B. Parlour Abstract IP address lookup is a central processing function of Internet

More information

Resource Allocation Schemes for Gang Scheduling

Resource Allocation Schemes for Gang Scheduling Resource Allocation Schemes for Gang Scheduling B. B. Zhou School of Computing and Mathematics Deakin University Geelong, VIC 327, Australia D. Walsh R. P. Brent Department of Computer Science Australian

More information

FPGA-based Multithreading for In-Memory Hash Joins

FPGA-based Multithreading for In-Memory Hash Joins FPGA-based Multithreading for In-Memory Hash Joins Robert J. Halstead, Ildar Absalyamov, Walid A. Najjar, Vassilis J. Tsotras University of California, Riverside Outline Background What are FPGAs Multithreaded

More information

HANIC 100G: Hardware accelerator for 100 Gbps network traffic monitoring

HANIC 100G: Hardware accelerator for 100 Gbps network traffic monitoring CESNET Technical Report 2/2014 HANIC 100G: Hardware accelerator for 100 Gbps network traffic monitoring VIKTOR PUš, LUKÁš KEKELY, MARTIN ŠPINLER, VÁCLAV HUMMEL, JAN PALIČKA Received 3. 10. 2014 Abstract

More information

Load Distribution in Large Scale Network Monitoring Infrastructures

Load Distribution in Large Scale Network Monitoring Infrastructures Load Distribution in Large Scale Network Monitoring Infrastructures Josep Sanjuàs-Cuxart, Pere Barlet-Ros, Gianluca Iannaccone, and Josep Solé-Pareta Universitat Politècnica de Catalunya (UPC) {jsanjuas,pbarlet,pareta}@ac.upc.edu

More information

FAST IP ADDRESS LOOKUP ENGINE FOR SOC INTEGRATION

FAST IP ADDRESS LOOKUP ENGINE FOR SOC INTEGRATION FAST IP ADDRESS LOOKUP ENGINE FOR SOC INTEGRATION Tomas Henriksson Department of Electrical Engineering Linköpings universitet SE-581 83 Linköping tomhe@isy.liu.se Ingrid Verbauwhede UCLA EE Dept 7440B

More information

Provider-Based Deterministic Packet Marking against Distributed DoS Attacks

Provider-Based Deterministic Packet Marking against Distributed DoS Attacks Provider-Based Deterministic Packet Marking against Distributed DoS Attacks Vasilios A. Siris and Ilias Stavrakis Institute of Computer Science, Foundation for Research and Technology - Hellas (FORTH)

More information

Binary search tree with SIMD bandwidth optimization using SSE

Binary search tree with SIMD bandwidth optimization using SSE Binary search tree with SIMD bandwidth optimization using SSE Bowen Zhang, Xinwei Li 1.ABSTRACT In-memory tree structured index search is a fundamental database operation. Modern processors provide tremendous

More information

International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research)

International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) ISSN (Print): 2279-0020 ISSN (Online): 2279-0039 International

More information

Physical Data Organization

Physical Data Organization Physical Data Organization Database design using logical model of the database - appropriate level for users to focus on - user independence from implementation details Performance - other major factor

More information

Scaling 10Gb/s Clustering at Wire-Speed

Scaling 10Gb/s Clustering at Wire-Speed Scaling 10Gb/s Clustering at Wire-Speed InfiniBand offers cost-effective wire-speed scaling with deterministic performance Mellanox Technologies Inc. 2900 Stender Way, Santa Clara, CA 95054 Tel: 408-970-3400

More information

IBM Proventia Network Intrusion Prevention System With Crossbeam X80 Platform

IBM Proventia Network Intrusion Prevention System With Crossbeam X80 Platform IBM Proventia Network Intrusion Prevention System With Crossbeam X80 Platform September 2008 pg. 1 Executive Summary The objective of this report is to provide performance guidance for IBM s Proventia

More information

High Performance String Matching Algorithm for a Network Intrusion Prevention System (NIPS)

High Performance String Matching Algorithm for a Network Intrusion Prevention System (NIPS) High Performance String Matching Algorithm for a Network Intrusion Prevention System (NIPS) Yaron Weinsberg Shimrit Tzur-David Danny Dolev The Hebrew University Of Jerusalem Email: {wyaron,shimritd,dolev}@cs.huji.ac.il

More information

Cassandra A Decentralized, Structured Storage System

Cassandra A Decentralized, Structured Storage System Cassandra A Decentralized, Structured Storage System Avinash Lakshman and Prashant Malik Facebook Published: April 2010, Volume 44, Issue 2 Communications of the ACM http://dl.acm.org/citation.cfm?id=1773922

More information

Switch Fabric Implementation Using Shared Memory

Switch Fabric Implementation Using Shared Memory Order this document by /D Switch Fabric Implementation Using Shared Memory Prepared by: Lakshmi Mandyam and B. Kinney INTRODUCTION Whether it be for the World Wide Web or for an intra office network, today

More information

MPFC: Massively Parallel Firewall Circuits

MPFC: Massively Parallel Firewall Circuits MPFC: Massively Parallel s Sven Hager Frank Winkler Björn Scheuermann Klaus Reinhardt Computer Engineering Group Humboldt University of Berlin, Germany Email: {hagersve, fwinkler, scheuermann, reinhakl}@informatik.hu-berlin.de

More information

SIDN Server Measurements

SIDN Server Measurements SIDN Server Measurements Yuri Schaeffer 1, NLnet Labs NLnet Labs document 2010-003 July 19, 2010 1 Introduction For future capacity planning SIDN would like to have an insight on the required resources

More information

IT IS NOW common practice to monitor network traffic in

IT IS NOW common practice to monitor network traffic in IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, VOL. 16, NO. 1, JANUARY 2008 57 Reconfigurable Architecture for Network Flow Analysis S. Yusuf, W. Luk, M. Sloman, N. Dulay, E. C. Lupu,

More information

GraySort on Apache Spark by Databricks

GraySort on Apache Spark by Databricks GraySort on Apache Spark by Databricks Reynold Xin, Parviz Deyhim, Ali Ghodsi, Xiangrui Meng, Matei Zaharia Databricks Inc. Apache Spark Sorting in Spark Overview Sorting Within a Partition Range Partitioner

More information

The new frontier of the DATA acquisition using 1 and 10 Gb/s Ethernet links. Filippo Costa on behalf of the ALICE DAQ group

The new frontier of the DATA acquisition using 1 and 10 Gb/s Ethernet links. Filippo Costa on behalf of the ALICE DAQ group The new frontier of the DATA acquisition using 1 and 10 Gb/s Ethernet links Filippo Costa on behalf of the ALICE DAQ group DATE software 2 DATE (ALICE Data Acquisition and Test Environment) ALICE is a

More information

IMPROVING PERFORMANCE OF RANDOMIZED SIGNATURE SORT USING HASHING AND BITWISE OPERATORS

IMPROVING PERFORMANCE OF RANDOMIZED SIGNATURE SORT USING HASHING AND BITWISE OPERATORS Volume 2, No. 3, March 2011 Journal of Global Research in Computer Science RESEARCH PAPER Available Online at www.jgrcs.info IMPROVING PERFORMANCE OF RANDOMIZED SIGNATURE SORT USING HASHING AND BITWISE

More information

Layered Protocol Wrappers for Internet Packet Processing in Reconfigurable Hardware

Layered Protocol Wrappers for Internet Packet Processing in Reconfigurable Hardware Layered Protocol Wrappers for Internet Packet Processing in Reconfigurable Hardware Florian Braun John Lockwood Marcel Waldvogel Applied Research Laboratory Washington University in St. Louis Abstract

More information

40G MACsec Encryption in an FPGA

40G MACsec Encryption in an FPGA 40G MACsec Encryption in an FPGA Dr Tom Kean, Managing Director, Algotronix Ltd, 130-10 Calton Road, Edinburgh EH8 8JQ United Kingdom Tel: +44 131 556 9242 Email: tom@algotronix.com February 2012 1 MACsec

More information

Hardware Pattern Matching for Network Traffic Analysis in Gigabit Environments

Hardware Pattern Matching for Network Traffic Analysis in Gigabit Environments Technische Universität München Fakultät für Informatik Diplomarbeit in Informatik Hardware Pattern Matching for Network Traffic Analysis in Gigabit Environments Gregor M. Maier Aufgabenstellerin: Prof.

More information

Layered Protocol Wrappers for Internet Packet Processing in Reconfigurable Hardware

Layered Protocol Wrappers for Internet Packet Processing in Reconfigurable Hardware Layered Protocol Wrappers for Internet Packet Processing in Reconfigurable Hardware Florian Braun John Lockwood Marcel Waldvogel Applied Research Laboratory Washington University in St. Louis Abstract

More information

A Systolic Algorithm to Process Compressed Binary Images

A Systolic Algorithm to Process Compressed Binary Images A Systolic Algorithm to Process Compressed Binary Images Fikret Ercal, Mark Allen, and Hao Feng University of Missouri Rolla Department of Computer Science and Intelligent Systems Center Rolla, MO 65401

More information

INTENSIVE FIXED CHUNKING (IFC) DE-DUPLICATION FOR SPACE OPTIMIZATION IN PRIVATE CLOUD STORAGE BACKUP

INTENSIVE FIXED CHUNKING (IFC) DE-DUPLICATION FOR SPACE OPTIMIZATION IN PRIVATE CLOUD STORAGE BACKUP INTENSIVE FIXED CHUNKING (IFC) DE-DUPLICATION FOR SPACE OPTIMIZATION IN PRIVATE CLOUD STORAGE BACKUP 1 M.SHYAMALA DEVI, 2 V.VIMAL KHANNA, 3 M.SHAHEEN SHAH 1 Assistant Professor, Department of CSE, R.M.D.

More information

Analysis of IP Spoofed DDoS Attack by Cryptography

Analysis of IP Spoofed DDoS Attack by Cryptography www..org 13 Analysis of IP Spoofed DDoS Attack by Cryptography Dalip Kumar Research Scholar, Deptt. of Computer Science Engineering, Institute of Engineering and Technology, Alwar, India. Abstract Today,

More information

A Content-Based Load Balancing Algorithm for Metadata Servers in Cluster File Systems*

A Content-Based Load Balancing Algorithm for Metadata Servers in Cluster File Systems* A Content-Based Load Balancing Algorithm for Metadata Servers in Cluster File Systems* Junho Jang, Saeyoung Han, Sungyong Park, and Jihoon Yang Department of Computer Science and Interdisciplinary Program

More information

Bit Vector Algorithms Enabling High-Speed and Memory- Efficient Firewall Blacklisting

Bit Vector Algorithms Enabling High-Speed and Memory- Efficient Firewall Blacklisting Bit Vector Algorithms Enabling High-Speed and Memory- Efficient Firewall Blacklisting Lane Thames Randal Abler David Keeling Georgia Institute of Technology Georgia Institute of Technology Georgia Institute

More information

Record Storage and Primary File Organization

Record Storage and Primary File Organization Record Storage and Primary File Organization 1 C H A P T E R 4 Contents Introduction Secondary Storage Devices Buffering of Blocks Placing File Records on Disk Operations on Files Files of Unordered Records

More information

Policy Distribution Methods for Function Parallel Firewalls

Policy Distribution Methods for Function Parallel Firewalls Policy Distribution Methods for Function Parallel Firewalls Michael R. Horvath GreatWall Systems Winston-Salem, NC 27101, USA Errin W. Fulp Department of Computer Science Wake Forest University Winston-Salem,

More information

Source-domain DDoS Prevention

Source-domain DDoS Prevention bhattacharjee, LTS S 05 Page: 0 Source-domain DDoS Prevention Bobby Bhattacharjee Christopher Kommareddy Mark Shayman Dave Levin Richard La Vahid Tabatabaee University of Maryland bhattacharjee, LTS S

More information

How To Test For Performance And Scalability On A Server With A Multi-Core Computer (For A Large Server)

How To Test For Performance And Scalability On A Server With A Multi-Core Computer (For A Large Server) Scalability Results Select the right hardware configuration for your organization to optimize performance Table of Contents Introduction... 1 Scalability... 2 Definition... 2 CPU and Memory Usage... 2

More information

FPGA Implementation of Network Security System Using Counting Bloom Filter

FPGA Implementation of Network Security System Using Counting Bloom Filter International Journal of Research in Information Technology (IJRIT) www.ijrit.com ISSN 2001-5569 FPGA Implementation of Network Security System Using Counting Bloom Filter Shruti, Harshada J. Patil 1PG

More information

MapReduce With Columnar Storage

MapReduce With Columnar Storage SEMINAR: COLUMNAR DATABASES 1 MapReduce With Columnar Storage Peitsa Lähteenmäki Abstract The MapReduce programming paradigm has achieved more popularity over the last few years as an option to distributed

More information

ECE 578 Term Paper Network Security through IP packet Filtering

ECE 578 Term Paper Network Security through IP packet Filtering ECE 578 Term Paper Network Security through IP packet Filtering Cheedu Venugopal Reddy Dept of Electrical Eng and Comp science Oregon State University Bin Cao Dept of electrical Eng and Comp science Oregon

More information

INTRUSION PROTECTION AGAINST SQL INJECTION ATTACKS USING REVERSE PROXY

INTRUSION PROTECTION AGAINST SQL INJECTION ATTACKS USING REVERSE PROXY INTRUSION PROTECTION AGAINST SQL INJECTION ATTACKS USING REVERSE PROXY Asst.Prof. S.N.Wandre Computer Engg. Dept. SIT,Lonavala University of Pune, snw.sit@sinhgad.edu Gitanjali Dabhade Monika Ghodake Gayatri

More information

Hybrid Data Structure for IP Lookup in Virtual Routers Using FPGAs

Hybrid Data Structure for IP Lookup in Virtual Routers Using FPGAs Hybrid Data Structure for IP Lookup in Virtual Routers Using FPGAs O guzhan Erdem Electrical and Electronics Engineering Middle East Technical University Ankara, TURKEY 68 Email: ogerdem@metu.edu.tr Hoang

More information

International journal of Engineering Research-Online A Peer Reviewed International Journal Articles available online http://www.ijoer.

International journal of Engineering Research-Online A Peer Reviewed International Journal Articles available online http://www.ijoer. RESEARCH ARTICLE ISSN: 2321-7758 GLOBAL LOAD DISTRIBUTION USING SKIP GRAPH, BATON AND CHORD J.K.JEEVITHA, B.KARTHIKA* Information Technology,PSNA College of Engineering & Technology, Dindigul, India Article

More information

Improving the Database Logging Performance of the Snort Network Intrusion Detection Sensor

Improving the Database Logging Performance of the Snort Network Intrusion Detection Sensor -0- Improving the Database Logging Performance of the Snort Network Intrusion Detection Sensor Lambert Schaelicke, Matthew R. Geiger, Curt J. Freeland Department of Computer Science and Engineering University

More information

Second-generation (GenII) honeypots

Second-generation (GenII) honeypots Second-generation (GenII) honeypots Bojan Zdrnja CompSci 725, University of Auckland, Oct 2004. b.zdrnja@auckland.ac.nz Abstract Honeypots are security resources which trap malicious activities, so they

More information

Dynamic Resource Allocation in Softwaredefined Radio The Interrelation Between Platform Architecture and Application Mapping

Dynamic Resource Allocation in Softwaredefined Radio The Interrelation Between Platform Architecture and Application Mapping Dynamic Resource Allocation in Softwaredefined Radio The Interrelation Between Platform Architecture and Application Mapping V. Marojevic, X. Revés, A. Gelonch Polythechnic University of Catalonia Dept.

More information

Locality Based Protocol for MultiWriter Replication systems

Locality Based Protocol for MultiWriter Replication systems Locality Based Protocol for MultiWriter Replication systems Lei Gao Department of Computer Science The University of Texas at Austin lgao@cs.utexas.edu One of the challenging problems in building replication

More information

A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS

A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS Sumanta Saha, Md. Safiqul Islam, Md. Sakhawat Hossen School of Information and Communication Technology The Royal Institute of Technology (KTH) Stockholm,

More information