DocumentCode
2992965
Title
A workload for evaluating deep packet inspection architectures
Author
Becchi, Michela ; Franklin, Mark ; Crowley, Patrick
Author_Institution
Comput. Sci. & Eng. Dept., Washington Univ. in St. Louis, St. Louis, MO
fYear
2008
fDate
14-16 Sept. 2008
Firstpage
79
Lastpage
89
Abstract
High-speed content inspection of network traffic is an important new application area for programmable networking systems, and has recently led to several proposals for high-performance regular expression matching. At the same time, the number and complexity of the patterns present in well-known network intrusion detection systems has been rapidly increasing. This increase is important since both the practicality and the performance of specific pattern matching designs are strictly dependent upon characteristics of the underlying regular expression set. However, a commonly agreed upon workload for the evaluation of deep packet inspection architectures is still missing, leading to frequent unfair comparisons, and to designs lacking in generality or scalability. In this paper, we propose a workload for the evaluation of regular expression matching architectures. The workload includes a regular expression model and a traffic generator, with the former characterizing different levels of expressiveness within rule-sets and the latter characterizing varying degrees of malicious network activity. The proposed workload is used here to evaluate designs (e.g., different memory layouts and hardware organizations) where the matching algorithm is based on compressed deterministic and non deterministic finite automata (DFAs and NFAs).
Keywords
communication complexity; computer networks; data compression; deterministic automata; finite automata; formal languages; string matching; telecommunication security; telecommunication traffic; communication complexity; compressed deterministic finite automata; compressed nondeterministic finite automata; deep packet inspection architecture; high-performance regular expression pattern matching; high-speed content inspection; malicious network activity; network intrusion detection system; network traffic; programmable networking system; Algorithm design and analysis; Character generation; Hardware; Inspection; Intrusion detection; Pattern matching; Proposals; Scalability; Telecommunication traffic; Traffic control;
fLanguage
English
Publisher
ieee
Conference_Titel
Workload Characterization, 2008. IISWC 2008. IEEE International Symposium on
Conference_Location
Seattle, WA
Print_ISBN
978-1-4244-2777-2
Electronic_ISBN
978-1-4244-2778-9
Type
conf
DOI
10.1109/IISWC.2008.4636093
Filename
4636093
Link To Document