Deep Packet Inspection as a Service Author : Anat Bremler-Barr, Yotam Harchol, David Hay and Yaron Koral Conference: ACM 10th International Conference.

Slides:



Advertisements
Similar presentations
Deep Packet Inspection as a Service Yaron Koral† Joint work with Anat Bremler-Barr‡, Yotam Harchol† and David Hay† †The Hebrew University, Israel ‡IDC.
Advertisements

MCA 2: Multi Core Architecture for Mitigating Complexity Attacks Yaron Koral (TAU) Joint work with: Yehuda Afek (TAU), Anat Bremler-Barr (IDC), David Hay.
Improved TCAM-based Pre-Filtering for Network Intrusion Detection Systems Department of Computer Science and Information Engineering National Cheng Kung.
Compact State Machines for High Performance Pattern Matching Department of Computer Science and Information Engineering National Cheng Kung University,
1 Accelerating Multi-Patterns Matching on Compressed HTTP Traffic Authors: Anat Bremler-Barr, Yaron Koral Presenter: Chia-Ming,Chang Date: Publisher/Conf.
1 Regular expression matching with input compression : a hardware design for use within network intrusion detection systems Department of Computer Science.
An Efficient and Scalable Pattern Matching Scheme for Network Security Applications Department of Computer Science and Information Engineering National.
Deep Packet Inspection with Regular Expression Matching Min Chen, Danny Guo {michen, CSE Dept, UC Riverside 03/14/2007.
Gnort: High Performance Intrusion Detection Using Graphics Processors Giorgos Vasiliadis, Spiros Antonatos, Michalis Polychronakis, Evangelos Markatos,
Intrusion Prevention System Group 6 Mu-Hsin Wei Renaud Moussounda Group 6 Mu-Hsin Wei Renaud Moussounda.
Opportunities in Middlebox Virtualization Prof. Anat Bremler-Barr IDC Herzliya Supported by European Research Council (ERC) Starting.
Enabling Innovation Inside the Network Jennifer Rexford Princeton University
OpenFlow-Based Server Load Balancing GoneWild Author : Richard Wang, Dana Butnariu, Jennifer Rexford Publisher : Hot-ICE'11 Proceedings of the 11th USENIX.
Deep Packet Inspection as a Service Anat Bremler-Barr IDC Herzliya Joint work with Yotam Harchol, David Hay and Yaron Koral The Hebrew University Appeared.
Sampling Techniques to Accelerate Pattern Matching in Network Intrusion Detection Systems Author: Domenico Ficara, Gianni Antichi, Andrea Di Pietro, Stefano.
Packet Classification Using Multi-Iteration RFC Author: Chun-Hui Tsai, Hung-Mao Chu, Pi-Chung Wang Publisher: COMPSACW, 2013 IEEE 37th Annual (Computer.
Leveraging Traffic Repetitions for High- Speed Deep Packet Inspection Author: Anat Bremler-Barr, Shimrit Tzur David, Yotam Harchol, David Hay Publisher:
A Hybrid IP Lookup Architecture with Fast Updates Author : Layong Luo, Gaogang Xie, Yingke Xie, Laurent Mathy, Kavé Salamatian Conference: IEEE INFOCOM,
EQC16: An Optimized Packet Classification Algorithm For Large Rule-Sets Author: Uday Trivedi, Mohan Lal Jangir Publisher: 2014 International Conference.
StriD 2 FA: Scalable Regular Expression Matching for Deep Packet Inspection Author: Xiaofei Wang, Junchen Jiang, Yi Tang, Bin Liu, and Xiaojun Wang Publisher:
Deterministic Finite Automaton for Scalable Traffic Identification: the Power of Compressing by Range Authors: Rafael Antonello, Stenio Fernandes, Djamel.
Regular Expression Matching for Reconfigurable Packet Inspection Authors: Jo˜ao Bispo, Ioannis Sourdis, Jo˜ao M.P. Cardoso and Stamatis Vassiliadis Publisher:
Department of Computer Science and Engineering Applied Research Laboratory Architecture for a Hardware Based, TCP/IP Content Scanning System David V. Schuehler.
DBS A Bit-level Heuristic Packet Classification Algorithm for High Speed Network Author : Baohua Yang, Xiang Wang, Yibo Xue, Jun Li Publisher : th.
Memory-Efficient Regular Expression Search Using State Merging Author: Michela Becchi, Srihari Cadambi Publisher: INFOCOM th IEEE International.
CellSDN: Software-Defined Cellular Core networks Xin Jin Princeton University Joint work with Li Erran Li, Laurent Vanbever, and Jennifer Rexford.
Selective Packet Inspection to Detect DoS Flooding Using Software Defined Networking Author : Tommy Chin Jr., Xenia Mountrouidou, Xiangyang Li and Kaiqi.
Memory-Efficient and Scalable Virtual Routers Using FPGA Department of Computer Science and Information Engineering, National Cheng Kung University, Tainan,
Early Detection of DDoS Attacks against SDN Controllers
FlowTags: Enforcing Network-Wide Policies in the Presence of Dynamic Middlebox Actions Author: Seyed Kaveh Fayazbakhsh, Vyas Sekar, Minlan Yu and Jeffrey.
Shadow MACs: Scalable Label- switching for Commodity Ethernet Author: Kanak Agarwal, John Carter, Eric Rozner and Colin Dixon Publisher: HotSDN 2014 Presenter:
Updating Designed for Fast IP Lookup Author : Natasa Maksic, Zoran Chicha and Aleksandra Smiljani´c Conference: IEEE High Performance Switching and Routing.
TFA: A Tunable Finite Automaton for Regular Expression Matching Author: Yang Xu, Junchen Jiang, Rihua Wei, Yang Song and H. Jonathan Chao Publisher: ACM/IEEE.
A Fast Regular Expression Matching Engine for NIDS Applying Prediction Scheme Author: Lei Jiang, Qiong Dai, Qiu Tang, Jianlong Tan and Binxing Fang Publisher:
Lossy Compression of Packet Classifiers Author: Ori Rottenstreich, J’anos Tapolcai Publisher: 2015 IEEE International Conference on Communications Presenter:
GFlow: Towards GPU-based High- Performance Table Matching in OpenFlow Switches Author : Kun Qiu, Zhe Chen, Yang Chen, Jin Zhao, Xin Wang Publisher : Information.
LOP_RE: Range Encoding for Low Power Packet Classification Author: Xin He, Jorgen Peddersen and Sri Parameswaran Conference : IEEE 34th Conference on Local.
SRD-DFA Achieving Sub-Rule Distinguishing with Extended DFA Structure Author: Gao Xia, Xiaofei Wang, Bin Liu Publisher: IEEE DASC (International Conference.
Practical Multituple Packet Classification Using Dynamic Discrete Bit Selection Author: Baohua Yang, Fong J., Weirong Jiang, Yibo Xue, Jun Li Publisher:
LightFlow : Speeding Up GPU-based Flow Switching and Facilitating Maintenance of Flow Table Author : Nobutaka Matsumoto and Michiaki Hayashi Conference:
JA-trie: Entropy-Based Packet Classification Author: Gianni Antichi, Christian Callegari, Andrew W. Moore, Stefano Giordano, Enrico Anastasi Conference.
THE HEBREW UNIVERSITY OF JERUSALEM OpenBox: A Software-Defined Framework for Developing, Deploying, and Managing Network Functions Yotam Harchol The Hebrew.
Xin Li, Chen Qian University of Kentucky
Yotam Harchol The Hebrew University of Jerusalem
Yotam Harchol The Hebrew University of Jerusalem
David Hay The Hebrew University of Jerusalem
2018/4/23 Dynamic Load-balanced Path Optimization in SDN-based Data Center Networks Author: Yuan-Liang Lan , Kuochen Wang and Yi-Huai Hsu Presenter: Yi-Hsien.
The DPIaaS Controller Prototype
A DFA with Extended Character-Set for Fast Deep Packet Inspection
2018/6/26 An Energy-efficient TCAM-based Packet Classification with Decision-tree Mapping Author: Zhao Ruan, Xianfeng Li , Wenjun Li Publisher: 2013.
Yotam Harchol The Hebrew University of Jerusalem
James Logan CS526 Dr. Chow April 29, 2009
2018/11/19 Source Routing with Protocol-oblivious Forwarding to Enable Efficient e-Health Data Transfer Author: Shengru Li, Daoyun Hu, Wenjian Fang and.
SigMatch Fast and Scalable Multi-Pattern Matching
Parallel Processing Priority Trie-based IP Lookup Approach
2019/1/1 High Performance Intrusion Detection Using HTTP-Based Payload Aggregation 2017 IEEE 42nd Conference on Local Computer Networks (LCN) Author: Felix.
2019/1/3 Exscind: Fast Pattern Matching for Intrusion Detection Using Exclusion and Inclusion Filters Next Generation Web Services Practices (NWeSP) 2011.
Memory-Efficient Regular Expression Search Using State Merging
Virtual TCAM for Data Center Switches
Yotam Harchol The Hebrew University of Jerusalem
A New String Matching Algorithm Based on Logical Indexing
2019/5/2 Using Path Label Routing in Wide Area Software-Defined Networks with OpenFlow ICNP = International Conference on Network Protocols Presenter:Hung-Yen.
Compact DFA Structure for Multiple Regular Expressions Matching
Fast Network Congestion Detection And Avoidance Using P4
OpenSec:Policy-Based Security Using Software-Defined Networking
2019/7/26 OpenFlow-Enabled User Traffic Profiling in Campus Software Defined Networks Presenter: Wei-Li,Wang Date: 2016/1/4 Author: Taimur Bakhshi and.
Pattern Based Packet Filtering using NetFPGA in DETER Infrastructure
High Performance Pattern Matching using Bloom–Bloomier Filter
2019/9/3 Adaptive Hashing Based Multiple Variable Length Pattern Search Algorithm for Large Data Sets 比對 Simple Pattern 的方法是基於 Hash 並且可以比對不同長度的 Pattern。
2019/10/19 Efficient Software Packet Processing on Heterogeneous and Asymmetric Hardware Architectures Author: Eva Papadogiannaki, Lazaros Koromilas, Giorgos.
Presentation transcript:

Deep Packet Inspection as a Service Author : Anat Bremler-Barr, Yotam Harchol, David Hay and Yaron Koral Conference: ACM 10th International Conference on emerging Networking EXperiments and Technologies(CoNEXT), 2014 Presenter: Kuan-Chieh Feng Date: 2015/10/07 Department of Computer Science and Information Engineering National Cheng Kung University, Taiwan R.O.C.

Outline Introduction Architecture DPI Service Instance Implementation Experiment Result Conclusion National Cheng Kung University CSIE Computer & Internet Architecture Lab 2

Introduction - DPI Based Middleboxes Intrusion Detection System Network Anti-Virus L7 Firewall L7 Load Balancer Leakage Prevention System Network Analytic Traffic Shaper Lawful Interception Copyright Enforcement 3 National Cheng Kung University CSIE Computer & Internet Architecture Lab

Introduction Each MB implements its own DPI engine (higher MB costs) Each packet is scanned multiple times causing waste of computation resources National Cheng Kung University CSIE Computer & Internet Architecture Lab 4

Introduction DPI engine is the most time-consuming task and it may take most of the middlebox processing time. DPI engine is considered a system bottleneck in many of todays MBs (30%- 80%) [*Laboratory simulations over real deployments of Snort and ClamAV] National Cheng Kung University CSIE Computer & Internet Architecture Lab 5

Introduction The idea of having a centralized DPI service instead of multiple instances of it at each Middlebox. National Cheng Kung University CSIE Computer & Internet Architecture Lab 6

Introduction SDN (Software Define Network) SDN makes it possible to perform traffic steering. This paper uses this flexibility to route traffic to a DPI service when needed. NFV (Network Function Virtualization) The main objective of NFV is to reduce the operational costs of these appliances. NFV provides easier management and maintenance. DPI is a significant example of an appliance or functionality that may be virtualized. National Cheng Kung University CSIE Computer & Internet Architecture Lab 7

Introduction Aho-Corasick algorithm (AC algorithm) The AC algorithm is the de-facto standard for contemporary network intrusion detection systems (NIDS). It matches strings simultaneously by constructing a DFA that represents the pattern set. National Cheng Kung University CSIE Computer & Internet Architecture Lab 8

9

Introduction Pattern set : {EDAE, BE, CDBA, CBD} National Cheng Kung University CSIE Computer & Internet Architecture Lab 10 A D E E C B E D B B D A D D E E

DPI2 Architecture L7 FW1 IDS1 DPI1 IDS2 AV2 AV1 TS S1 S2 S3 S4 SDN Controller Traffic Steering DPI Controller hello Register Rules Add Patterns Update Policy Chain 11

Architecture – DPI controller DPI controller is a centralized entity to manage the DPI process across the network. Two kinds of procedures take place between the DPI Controller and middleboxes. Register Pattern set management DPI controller is also responsible for initializing DPI service instances and deployment of different DPI service instances across the network National Cheng Kung University CSIE Computer & Internet Architecture Lab 12

Architecture – Passing Pattern Matching Result Network Service Header (NSH) Separate result-packet Delay packet until result-packet arrives National Cheng Kung University CSIE Computer & Internet Architecture Lab 13 hello

Architecture – Deployment A common deployment choice is to group together similar policy chains and to deploy instances. For example: Sets of patterns that correspond to HTTP traffic may be allocated to some DPI service instance while patterns correspond to FTP traffic is allocated to other DPI service instance. National Cheng Kung University CSIE Computer & Internet Architecture Lab 14

DPI Service Instance Implementation National Cheng Kung University CSIE Computer & Internet Architecture Lab 15

DPI Service Instance Implementation National Cheng Kung University CSIE Computer & Internet Architecture Lab 16

DPI Service Instance Implementation National Cheng Kung University CSIE Computer & Internet Architecture Lab 17

DPI Service Instance Implementation Pattern Set 1Pattern Set 2 Pattern set 1 Pattern set 2 Both sets

DPI Service Instance Implementation National Cheng Kung University CSIE Computer & Internet Architecture Lab 19 ]*SYSTEM[^>]*>.*\x2EparseError <\x21DOCTYPE SYSTEM\x2EparseError

Experimental Environment POX SDN Controller (OpenFlow 1.0) Static steering mechanism DPI Service and Middlebox using separate machines Toy middlebox applications: Snort, ClamAV Functionality: Tested in virtual environments (Mininet, VMWare) Toy Snort2 Toy ClamAV Toy Snort1 Virtual Environment DPI Controller Static Steering Runs over POX SDN Controller DPI Service Instance 20

Experiment Results - Performance National Cheng Kung University CSIE Computer & Internet Architecture Lab 21 Overall Latency Overall Throughput LatencyThroughputSpacePatterns 21.5us/p668.4Mbps 9.69us/p 807.7Mbps71.18M B 4356Snort 11.91us/p 668.4Mbps1.87GB31827 ClamA V IDS1 Policy Chain with Two DPIs : Combined DPI instances (DPI as a Service): IDS1AV1 IDS1 AV1 DPI1 DPI2 Each using separate machines AV1

Experiment Results – Road Traffic National Cheng Kung University CSIE Computer & Internet Architecture Lab 22 Separate IDSs: Static Load Balancing DPI as a Service: Dynamic Load Balancing Two separate policy chains: Combined DPI instances (DPI as a Service): IDS1 AV1 IDS1DPI1 AV1DPI2

Conclusion DPI is a common service used by today’s MB Thanks to its scalability it may be easily exported as a stand-alone network service DPI as a Service provides: Innovation (Lower entry barriers) Network scalability Lower costs (Cheaper MB Hardware) National Cheng Kung University CSIE Computer & Internet Architecture Lab 23