DocumentCode :
2171322
Title :
An architecture for exploiting multi-core processors to parallelize network intrusion prevention
Author :
Paxson, V. ; Sommer, Rainer ; Weaver, N.
Author_Institution :
Lawrence Berkeley Nat. Lab., Int. Comput. Sci. Inst., Berkeley, CA
fYear :
2007
fDate :
April 30 2007-May 2 2007
Firstpage :
1
Lastpage :
7
Abstract :
It is becoming increasingly difficult to implement effective systems for preventing network attacks, due to the combination of (1) the rising sophistication of attacks requiring more complex analysis to detect, (2) the relentless growth in the volume of network traffic that we must analyze, and, critically, (3) the failure in recent years for uniprocessor performance to sustain the exponential gains that for so many years CPUs enjoyed (ldquoMoorepsilas Lawrdquo). For commodity hardware, tomorrowpsilas performance gains will instead come from multicore architectures in which a whole set of CPUs executes concurrently. Taking advantage of the full power of multi-core processors for network intrusion prevention requires an indepth approach. In this work we frame an architecture customized for parallel execution of network attack analysis. At the lowest layer of the architecture is an ldquoActive Network Interfacerdquo (ANI), a custom device based on an inexpensive FPGA platform. The ANI provides the inline interface to the network, reading in packets and forwarding them after they are approved. It also serves as the front-end for dispatching copies of the packets to a set of analysis threads. The analysis itself is structured as an event-based system, which allows us to find many opportunities for concurrent execution, since events introduce a natural, decoupled asynchrony into the flow of analysis while still maintaining good cache locality. Finally, by associating events with the packets that ultimately stimulated them, we can determine when all analysis for a given packet has completed, and thus that it is safe to forward the pending packet - providing none of the analysis elements previously signaled that the packet should instead be discarded.
Keywords :
field programmable gate arrays; multiprocessing systems; network interfaces; security of data; FPGA platform; active network interface; event-based system; multicore processor; network attacks; network traffic; parallel execution; parallelize network intrusion prevention; Dispatching; Failure analysis; Field programmable gate arrays; Hardware; Multicore processing; Performance analysis; Performance gain; Signal analysis; Telecommunication traffic; Yarn;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Sarnoff Symposium, 2007 IEEE
Conference_Location :
Nassau Inn, Princeton, NJ
Print_ISBN :
978-1-4244-2483-2
Type :
conf
DOI :
10.1109/SARNOF.2007.4567341
Filename :
4567341
Link To Document :
بازگشت