首页> 外文OA文献 >Hardware acceleration of network intrusion detection and prevention
【2h】

Hardware acceleration of network intrusion detection and prevention

机译:硬件加速网络入侵检测与预防

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

Network Intrusion Detection and Prevention Systems (NIDPS) are important elements of network security. Their role is to monitor internet traffic for malicious content and, on detection, generate an alert message and/or block the offending traffic. Potential attacks are described in a database of rules known as the rule set, where each rule consists of an IP header part and a payload signature part. The payload signature can be in the form of a fixed string and/or regular expression. This thesis studies the three main stages of these systems, namely TCP/IP reassembly, multi-match header matching and Deep Packet Inspection (DPI).udTCP/IP reassembly is a necessary prerequisite to DPI as attack patterns may span more than one IP fragment or TCP segment. Either target-based reassembly or traffic normalisation is required in order to overcome insertion/evasion attacks. This thesis builds upon existing research by outlining an FPGA-based architecture that handles the common case of reassembling in-sequence data streams in hardware and the much rarer out-of-sequence data streams in software.udMulti-match header matching involves the matching of each packet header against the header section of all rules. This differs from the single-match classification used in routers where there is a single highest priority match per packet. The strategy adopted in this thesis was to adapt a number of single match algorithms to perform multi-matching and to compare their performance with existing solutions. Existing solutions typically involve the use of Ternary Content Addressable Memory (TCAM) and therefore suffer from disadvantages such as high cost, high energy consumption, and low storage efficiency. Algorithmic solutions, which use SRAM instead of TCAM, can therefore have an advantage. The adapted algorithms were implemented in C code and evaluated in terms of speed and energy efficiency on an ARM processor.udDPI is particularly challenging due to the number and complexity of regular expressions. This thesis builds on existing research into Bit-Parallel hardware architectures. The main contribution is an extension for the efficient handling of the constrained {min,max} repetition syntax, including a solution to the issue of counter overlap. This allows for the handling of many additional regular expressions that would otherwise be unsuitable. The design was implemented in VHDL and evaluated using the Xilinx tool set. A comprehensive review of the most significant research works in the DPI field is also provided.
机译:网络入侵检测和防御系统(NIDPS)是网络安全的重要元素。它们的作用是监视互联网流量中是否存在恶意内容,并在检测到时生成警报消息和/或阻止有害流量。潜在的攻击在称为规则集的规则数据库中进行了描述,其中每个规则由IP标头部分和有效负载签名部分组成。有效载荷签名可以采用固定字符串和/或正则表达式的形式。本文研究了这些系统的三个主要阶段,即TCP / IP重组,多匹配报头匹配和深度包检查(DPI)。 udTCP / IP重组是DPI的必要先决条件,因为攻击模式可能跨越多个IP片段或TCP段。为了克服插入/逃避攻击,需要基于目标的重组或流量标准化。本文在现有研究的基础上,概述了一种基于FPGA的体系结构,该体系结构处理在硬件中重组顺序数据流和在软件中稀疏的乱序数据流的常见情况。 ud多匹配头匹配涉及匹配每个数据包标头相对于所有规则的标头部分。这与路由器中使用的单匹配分类不同,后者在每个数据包中只有一个最高优先级匹配。本文采用的策略是采用多种单匹配算法进行多重匹配,并将其性能与现有解决方案进行比较。现有解决方案通常涉及使用三进制内容可寻址存储器(TCAM),因此存在诸如高成本,高能耗和低存储效率的缺点。因此,使用SRAM代替TCAM的算法解决方案可以具有优势。改编后的算法以C代码实现,并在ARM处理器上根据速度和能效进行了评估。 udDPI由于正则表达式的数量和复杂性而特别具有挑战性。本文基于对Bit-Parallel硬件体系结构的现有研究。主要贡献是扩展了对受约束的{min,max}重复语法的有效处理,包括解决计数器重叠问题。这允许处理许多其他不合适的正则表达式。该设计在VHDL中实现,并使用Xilinx工具集进行了评估。还提供了DPI领域最重要研究工作的全面综述。

著录项

  • 作者

    Cronin Brendan;

  • 作者单位
  • 年度 2014
  • 总页数
  • 原文格式 PDF
  • 正文语种 en
  • 中图分类

相似文献

  • 外文文献
  • 中文文献
  • 专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号