...
首页> 外文期刊>ACM Transactions on Embedded Computing Systems >Deep Network Packet Filter Design for Reconfigurable Devices
【24h】

Deep Network Packet Filter Design for Reconfigurable Devices

机译:可重配置设备的深度网络数据包过滤器设计

获取原文
获取原文并翻译 | 示例
           

摘要

Most network routers and switches provide some protection against the network attacks. However, the rapidly increasing amount of damages reported over the past few years indicates the urgent need for tougher security. Deep-packet inspection is one of the solutions to capture packets that can not be identified using the traditional methods. It uses a list of signatures to scan the entire content of the packet, providing the means to filter harmful packets out of the network. Since one signature does not depend on the other, the filtering process has a high degree of parallelism. Most software and hardware deep-packet filters that are in use today execute the tasks under Von Neuman architecture. Such architecture can not fully take advantage of the parallelism. For instance, one of the most widely used network intrusion-detection systems, Snort, configured with 845 patterns, running on a dual 1-GHz Pentium III system, can sustain a throughput of only 50 Mbps. The poor performance is because of the fact that the processor is programmed to execute several tasks sequentially instead of simultaneously. We designed scalable deep-packet filters on field-programmable gate arrays (FPGAs) to search for all data-independent patterns simultaneously. With FPGAs, we have the ability to reprogram the filter when there are any changes to the signature set. The smallest full-pattern matcher implementation for the latest Snort NIDS fits in a single 400k Xilinx FPGA (Spartan 3-XC3S400) with a sustained throughput of 1.6 Gbps. Given a larger FPGA, the design can scale linearly to support a greater number of patterns, as well as higher data throughput.
机译:大多数网络路由器和交换机都提供了一些抵御网络攻击的保护措施。但是,过去几年中报告的损害赔偿额迅速增加,表明迫切需要加强安全性。深度数据包检查是捕获使用传统方法无法识别的数据包的解决方案之一。它使用签名列表来扫描数据包的整个内容,从而提供了将有害数据包过滤出网络的方法。由于一个签名不依赖于另一个签名,因此过滤过程具有高度的并行性。当今使用的大多数软件和硬件深包过滤器都在冯·诺伊曼架构下执行任务。这样的架构不能充分利用并行性。例如,Snort是使用最广泛的网络入侵检测系统之一,配置了845个模式,运行在双1-GHz Pentium III系统上,只能维持50 Mbps的吞吐量。性能不佳的原因是处理器被编程为依次而不是同时执行几个任务。我们在现场可编程门阵列(FPGA)上设计了可扩展的深包过滤器,以同时搜索所有与数据无关的模式。使用FPGA,我们可以在签名集发生任何更改时对滤波器进行重新编程。最新的Snort NIDS的最小的全模式匹配器实现适合单个400k Xilinx FPGA(Spartan 3-XC3S400),并具有1.6 Gbps的持续吞吐量。在给定较大的FPGA的情况下,该设计可以线性扩展以支持更多的模式以及更高的数据吞吐量。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号