Presentation is loading. Please wait.

Presentation is loading. Please wait.

Author: Weirong Jiang and Viktor K. Prasanna Publisher: ACM Symposium on Parallel Algorithms and Architectures, SPAA 2009 Presenter: Chin-Chung Pan Date:

Similar presentations


Presentation on theme: "Author: Weirong Jiang and Viktor K. Prasanna Publisher: ACM Symposium on Parallel Algorithms and Architectures, SPAA 2009 Presenter: Chin-Chung Pan Date:"— Presentation transcript:

1 Author: Weirong Jiang and Viktor K. Prasanna Publisher: ACM Symposium on Parallel Algorithms and Architectures, SPAA 2009 Presenter: Chin-Chung Pan Date: 2009/10/14

2 Outline Introduction Analysis of Snort Header Rule Sets Algorithms and Architecture The Field-Split Bit Vector (FSBV) Algorithm Basic Architecture Supporting Snort Features Performance Evaluation 2

3 Introduction Traditional network applications such as firewall processing require reporting only the highest-priority matching rule, which we call best-match packet classification. In contrast, network intrusion detection systems ( NIDS) needs multi-match packet classification to find all rule headers that match a given packet. Our work focuses on the multi-match packet header classification in NIDS. 3

4 Analysis of Snort Header Rule Sets 4

5 Algorithms and Architecture 5

6 Algorithms and Architecture - The Field-Split Bit Vector (FSBV) Algorithm Applying the FSBV algorithm for matching the DP field of a packet against three rules. 6

7 Algorithms and Architecture - Basic Architecture 7

8 Algorithms and Architecture - Supporting Snort Features We examined the usage of those unique features provided by Snort rules, including the value list, the negation operator, and the range operator for port fields. The negation operator “!”. For example, ![60,80] indicates any port number except 60 and 80. The range operator. For example, 60:80 indicates port number from 60 to 80. 8

9 Algorithms and Architecture - Supporting Snort Features 9

10 10 Other File DP(4-bit)Rule R1 R2 R3 R4 … … … … 11*0 0101 110* 0111 、 100* Range 12 、 14 5 12 、 13 7~9 R1R2R3R4R’4 01010 10101 00001 11110 11101 10010 10101 01111 0 1 0 1 0 1 0 1 10101 11110 11101 10101 & & & 10100 DP of the input packet:1 1 0 0 Rule Set Build bit vectors Perform match 1010 OR

11 Algorithms and Architecture - Supporting Snort Features 11 In N rules, a field of the ith rule is specified as a list of M values, the ith bit of all bit vectors for this field is expanded to M bits. N+M-1 bits N bits N+M-1 bits

12 Algorithms and Architecture - Supporting Snort Features Most of port fields are specified as a single value. Over 85% of the unique values for SP/DP fields are specified as a single value, while only around 10% of port field values are specified as ranges. Current Snort rule set uses few value lists. 12

13 Performance Evaluation - Results on Synthetic Rules 13

14 Performance Evaluation - Results on Snort Rules 14


Download ppt "Author: Weirong Jiang and Viktor K. Prasanna Publisher: ACM Symposium on Parallel Algorithms and Architectures, SPAA 2009 Presenter: Chin-Chung Pan Date:"

Similar presentations


Ads by Google