首页> 外文会议>IEEE Computer Society Annual Symposium on VLSI >Hardware/Software Isolation and Protection Architecture for Transparent Security Enforcement in Networked Devices
【24h】

Hardware/Software Isolation and Protection Architecture for Transparent Security Enforcement in Networked Devices

机译:硬件/软件隔离和保护体系结构,可在网络设备中透明实施安全性

获取原文

摘要

We present an integrated hardware/software architectureto enforce security in networked workstations andembedded devices such as printers and microscopes. Thesedevices are usually connected to the Internet without protection, so they are exposed to attack. Our solution operatesas an intermediate isolation and protection module (IPM) between the network and the device to be protected. TheIPM can be implemented as a dedicated IP on a system-onchip, or as a separate chip to analyze incoming and outgoingtraffic for malicious activities, in a transparent way to thedevice under protection. Security enforcement is performedin two stages. A deep packet inspection module is used inthe first stage to detect and drop packets originating fromknown blacklisted domains or carrying malware patterns, simultaneously important features from protocol-conformingpackets are extracted and sent to a binary classifier for furtherprocessing and decision making. The second stage uses a binaryclassifier to make decisions on seemingly protocol-conformingpackets. We designed and implemented a prototype of theIPM as a system-on-FPGA, with packet filtering and analysisaccelerated in hardware, and binary classification and decisionmaking in software. The IPM operates at high-speed witha very small footprint, suitable for embedded devices withfewer resources. Evaluation of our prototype using the 1999Knowledge Discovery in Databases (KDD Cup 1999 dataset) benchmarks shows a high detection rate on various distributeddenial-of-service (DDoS) attacks such as Neptune DoS (99.3%),Smurf DoS (100%), and Teardrop DoS (98.90%).
机译:我们提出了一种集成的硬件/软件体系结构,以在网络工作站和嵌入式设备(如打印机和显微镜)中增强安全性。这些设备通常在没有保护的情况下连接到Internet,因此容易受到攻击。我们的解决方案在网络和要保护的设备之间充当中间隔离和保护模块(IPM)。 IPM可以实现为片上系统上的专用IP,也可以实现为单独的芯片,以对受保护设备透明的方式分析传入和传出流量中是否存在恶意活动。安全执行分两个阶段执行。在第一阶段,将使用深度数据包检查模块来检测和丢弃源自已知黑名单域或携带恶意软件模式的数据包,同时提取符合协议的数据包的重要功能,并将其发送至二进制分类器,以进行进一步的处理和决策。第二阶段使用二进制分类器对看似符合协议的数据包进行决策。我们设计并实现了IPM原型,作为基于FPGA的系统,在硬件中加速了数据包过滤和分析,在软件中实现了二进制分类和决策。 IPM以很小的占用空间高速运行,适用于资源较少的嵌入式设备。使用1999年数据库中的知识发现(KDD Cup 1999年数据集)基准对我们的原型进行的评估显示,在各种分布式拒绝服务(DDoS)攻击(例如海王星DoS(99.3%),蓝精灵DoS(100%)和泪滴DoS(98.90%)。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号