首页> 外文会议>Reconfigurable Computing: Architectures, Tools and Applications >Highly Space Efficient Counters for Perl Compatible Regular Expressions in FPGAs
【24h】

Highly Space Efficient Counters for Perl Compatible Regular Expressions in FPGAs

机译:适用于FPGA中与Perl兼容的正则表达式的高效计数器

获取原文
获取原文并翻译 | 示例

摘要

Signature based network intrusion detection systems (NIDS) rely on an underlying string matching engine that inspects each network packet against a known malicious pattern database. Traditional static pattern descriptions may not efficiently represent sophisticated attack signatures. Recently, most NIDSs have adopted regular expressions such as Perl compatible regular expressions (PCREs) to describe an attack signature, especially for polymorphic worms. PCRE is a superset of traditional regular expression, in which no counters are involved. However, this overloads the performance of software-based NIDSs, causing a big portion of their execution time to be dedicated to pattern matching. Over the past decade, hardware acceleration for the pattern matching has been studied extensively and a marginal performance has been achieved. Among hardware approaches, FPGA-based acceleration engines provide great flexibility because new signatures can be compiled and programmed into their reconfigurable architecture. As more and more malicious signatures are discovered, it becomes harder to map a complete set of malicious signatures specified in PCREs to an FPGA chip. Even worse is that the counters used in PCREs typically take a great deal of hardware resources. Therefore, we propose a space efficient SelectRAM counter for PCREs that involve counting. The design takes advantage of components that consist of a configurable logic block, and thus optimizes space usage. A set of PCRE blocks has been built in hardware to implement PCREs used in Snort/Bro. Experimental results show that the proposed sheme outperforms existing designs by at least 5-fold. Performance results are reported in this paper.
机译:基于签名的网络入侵检测系统(NIDS)依赖于底层的字符串匹配引擎,该引擎根据已知的恶意模式数据库检查每个网络数据包。传统的静态模式描述可能无法有效地表示复杂的攻击特征。最近,大多数NIDS都采用了诸如Perl兼容正则表达式(PCRE)之类的正则表达式来描述攻击特征,尤其是对于多态蠕虫而言。 PCRE是传统正则表达式的超集,其中不涉及任何计数器。但是,这会使基于软件的NIDS的性能过载,从而导致其执行时间的很大一部分专用于模式匹配。在过去的十年中,对模式匹配的硬件加速进行了广泛的研究,并获得了边际性能。在硬件方法中,基于FPGA的加速引擎提供了极大的灵活性,因为可以将新的签名编译并编程到其可重新配置的体系结构中。随着越来越多的恶意签名被发现,将PCRE中指定的完整恶意签名集映射到FPGA芯片变得越来越困难。更糟糕的是,PCRE中使用的计数器通常占用大量硬件资源。因此,我们为涉及计数的PCRE提出了一种节省空间的SelectRAM计数器。该设计利用了由可配置逻辑块组成的组件,从而优化了空间使用。一组PCRE块已内置于硬件中,以实现Snort / Bro中使用的PCRE。实验结果表明,拟议的Sheme优于现有设计至少5倍。性能结果报告在本文中。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号