首页> 外文会议>IEEE Computer Society Annual Symposium on VLSI >Hardware/Software Isolation and Protection Architecture for Transparent Security Enforcement in Networked Devices
【24h】

Hardware/Software Isolation and Protection Architecture for Transparent Security Enforcement in Networked Devices

机译:用于网络设备中透明安全强制执行的硬件/软件隔离和保护架构

获取原文

摘要

We present an integrated hardware/software architectureto enforce security in networked workstations andembedded devices such as printers and microscopes. Thesedevices are usually connected to the Internet without protection, so they are exposed to attack. Our solution operatesas an intermediate isolation and protection module (IPM) between the network and the device to be protected. TheIPM can be implemented as a dedicated IP on a system-onchip, or as a separate chip to analyze incoming and outgoingtraffic for malicious activities, in a transparent way to thedevice under protection. Security enforcement is performedin two stages. A deep packet inspection module is used inthe first stage to detect and drop packets originating fromknown blacklisted domains or carrying malware patterns, simultaneously important features from protocol-conformingpackets are extracted and sent to a binary classifier for furtherprocessing and decision making. The second stage uses a binaryclassifier to make decisions on seemingly protocol-conformingpackets. We designed and implemented a prototype of theIPM as a system-on-FPGA, with packet filtering and analysisaccelerated in hardware, and binary classification and decisionmaking in software. The IPM operates at high-speed witha very small footprint, suitable for embedded devices withfewer resources. Evaluation of our prototype using the 1999Knowledge Discovery in Databases (KDD Cup 1999 dataset) benchmarks shows a high detection rate on various distributeddenial-of-service (DDoS) attacks such as Neptune DoS (99.3%),Smurf DoS (100%), and Teardrop DoS (98.90%).
机译:我们在网络工作站andembedded设备中介绍了一个集成的硬件/软件AstructUreeto强制安全性,如打印机和显微镜。该词通常与互联网连接而无需保护,因此它们暴露于攻击。我们的解决方案在网络之间运行中间隔离和保护模块(IPM)和要保护的设备。 TheIPM可以在系统上的专用IP上实现,或作为单独的芯片,以分析到可恶意活动的传入和突出动画,以透明的方式对保护的透明方式。安全实施是执行两个阶段。深度分组检测模块使用第一阶段来检测源自知识的黑名单域或携带恶意软件模式的数据包,同时提取来自协议 - 符合包的重要特征,并将其发送到二进制分类器以进行进一步处理和决策。第二阶段使用BinaryClassifier在看似协议的符合性包装上做出决定。我们设计并实现了TheIPM的原型,作为一个系统在FPGA,用数据包过滤和分析在硬件中,以及软件中的二进制分类和决策。 IPM在高速上运行非常小的占用空间,适用于嵌入式设备的资源。使用1999年的数据库中的原型评估我们的原型(KDD Cup 1999数据集)基准显示出在各种分布式职位(DDOS)攻击中的高检测率,例如海王星DOS(99.3%),SMURF DOS(100%)和泪滴DOS(98.90%)。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号