Internet Worms Paxson, Asanovic, Dharmapurikar, Lockwood, Pang, Sommer, Weaver Rethinking Hardware Support for Network Analysis and Intrusion Prevention.

Slides:



Advertisements
Similar presentations
Intrusion Detection Systems (I) CS 6262 Fall 02. Definitions Intrusion Intrusion A set of actions aimed to compromise the security goals, namely A set.
Advertisements

Intrusion Detection/Prevention Systems Charles Poff Bearing Point.
Prepared 7/28/2011 by T. O’Neil for 3460:677, Fall 2011, The University of Akron.
A Search Memory Substrate for High Throughput and Low Power Packet Processing Sangyeun Cho, Michel Hanna and Rami Melhem Dept. of Computer Science University.
4. Shared Memory Parallel Architectures 4.4. Multicore Architectures
A Scalable and Reconfigurable Search Memory Substrate for High Throughput Packet Processing Sangyeun Cho and Rami Melhem Dept. of Computer Science University.
Analyzing Network Traffic in the Presence of Adversaries Vern Paxson International Computer Science Institute / Lawrence Berkeley National Laboratory
Prof. Srinidhi Varadarajan Director Center for High-End Computing Systems.
Institute of Computer Science Foundation for Research and Technology – Hellas Greece Computer Architecture and VLSI Systems Laboratory Exploiting Spatial.
EECB 473 Data Network Architecture and Electronics Lecture 3 Packet Processing Functions.
Secure web browsers, malicious hardware, and hardware support for binary translation Sam King.
Chapter 8 Hardware Conventional Computer Hardware Architecture.
Router Architecture : Building high-performance routers Ian Pratt
Using Cell Processors for Intrusion Detection through Regular Expression Matching with Speculation Author: C˘at˘alin Radu, C˘at˘alin Leordeanu, Valentin.
1 An Evolution of Pattern Matching within Network Intrusion Detection Systems Erik Anderson 9 November 2006.
5/1/2006Sireesha/IDS1 Intrusion Detection Systems (A preliminary study) Sireesha Dasaraju CS526 - Advanced Internet Systems UCCS.
Chapter 6 Packet Processing Functions
1 New Architectures Need New Languages A triumph of optimism over experience! Ian Watson 3 rd July 2009.
Deep Packet Inspection with Regular Expression Matching Min Chen, Danny Guo {michen, CSE Dept, UC Riverside 03/14/2007.
Gnort: High Performance Intrusion Detection Using Graphics Processors Giorgos Vasiliadis, Spiros Antonatos, Michalis Polychronakis, Evangelos Markatos,
Building Survivable Systems based on Intrusion Detection and Damage Containment Paper by: T. Bowen Presented by: Tiyseer Al Homaiyd 1.
1 Instant replay  The semester was split into roughly four parts. —The 1st quarter covered instruction set architectures—the connection between software.
CPU Performance Assessment As-Bahiya Abu-Samra *Moore’s Law *Clock Speed *Instruction Execution Rate - MIPS - MFLOPS *SPEC Speed Metric *Amdahl’s.
Network-based and Attack-resilient Length Signature Generation for Zero-day Polymorphic Worms Zhichun Li 1, Lanjia Wang 2, Yan Chen 1 and Judy Fu 3 1 Lab.
Jennifer Rexford Princeton University MW 11:00am-12:20pm Programmable Data Planes COS 597E: Software Defined Networking.
Is Lambda Switching Likely for Applications? Tom Lehman USC/Information Sciences Institute December 2001.
Research & Development Roadmap 1. Outline A New Communication Framework Giving Bro Control over the Network Security Monitoring for Industrial Control.
Toward Self-directed Intrusion Detection Paul Barford Assistant Professor Computer Science University of Wisconsin June, 2005.
Computer Science Open Research Questions Adversary models –Define/Formalize adversary models Need to incorporate characteristics of new technologies and.
MIDeA :A Multi-Parallel Instrusion Detection Architecture Author: Giorgos Vasiliadis, Michalis Polychronakis,Sotiris Ioannidis Publisher: CCS’11, October.
1 Distributed Systems: an Introduction G53ACC Chris Greenhalgh.
A Framework for Packe Trace Manipulation Christian Kreibich.
OPERATING SYSTEMS Goals of the course Definitions of operating systems Operating system goals What is not an operating system Computer architecture O/S.
Vladimír Smotlacha CESNET Full Packet Monitoring Sensors: Hardware and Software Challenges.
Architectures of distributed systems Fundamental Models
HPC User Forum Back End Compiler Panel SiCortex Perspective Kevin Harris Compiler Manager April 2009.
Shared Memory Consistency Models. SMP systems support shared memory abstraction: all processors see the whole memory and can perform memory operations.
4/19/20021 TCPSplitter: A Reconfigurable Hardware Based TCP Flow Monitor David V. Schuehler.
Memory Consistency Models. Outline Review of multi-threaded program execution on uniprocessor Need for memory consistency models Sequential consistency.
Hot Interconnects TCP-Splitter: A Reconfigurable Hardware Based TCP/IP Flow Monitor David V. Schuehler
Classic Model of Parallel Processing
A Framework for Packe Trace Manipulation Christian Kreibich.
Algorithms to Accelerate Multiple Regular Expressions Matching for Deep Packet Inspection Sailesh Kumar Sarang Dharmapurikar Fang Yu Patrick Crowley Jonathan.
Lawrence Berkeley National Laboratory 1 James Rothfuss Computer Protection Program Manager Lawrence Berkeley National Lab Internet2 Security at Line Speed.
Author : Sarang Dharmapurikar, John Lockwood Publisher : IEEE Journal on Selected Areas in Communications, 2006 Presenter : Jo-Ning Yu Date : 2010/12/29.
High-Speed Policy-Based Packet Forwarding Using Efficient Multi-dimensional Range Matching Lakshman and Stiliadis ACM SIGCOMM 98.
Jennifer Rexford Fall 2014 (TTh 3:00-4:20 in CS 105) COS 561: Advanced Computer Networks TCP.
AMQP, Message Broker Babu Ram Dawadi. overview Why MOM architecture? Messaging broker like RabbitMQ in brief RabbitMQ AMQP – What is it ?
A Common Machine Language for Communication-Exposed Architectures Bill Thies, Michal Karczmarek, Michael Gordon, David Maze and Saman Amarasinghe MIT Laboratory.
End-to-End Principle Brad Karp UCL Computer Science CS 6007/GC15/GA07 25 th February, 2009.
Network-based and Attack-resilient Length Signature Generation for Zero-day Polymorphic Worms Zhichun Li 1, Lanjia Wang 2, Yan Chen 1 and Judy Fu 3 1 Lab.
for SDN-based flow handover in wireless environments Daniel Corujo Carlos Guimarães Rui L. Aguiar
3/12/07CS Visit Days1 A Sea Change in Processor Design Uniprocessor SpecInt Performance: From Hennessy and Patterson, Computer Architecture: A Quantitative.
Winter-Spring 2001Codesign of Embedded Systems1 Essential Issues in Codesign: Architectures Part of HW/SW Codesign of Embedded Systems Course (CE )
Hardware Trends CSE451 Andrew Whitaker. Motivation Hardware moves quickly OS code tends to stick around for a while “System building” extends way beyond.
Hardware Trends CSE451 Andrew Whitaker. Motivation Hardware moves quickly OS code tends to stick around for a while “System building” extends way beyond.
Fall 2012 Parallel Computer Architecture Lecture 4: Multi-Core Processors Prof. Onur Mutlu Carnegie Mellon University 9/14/2012.
Introduction to Parallel Processing
Jehandad Khan and Peter Athanas Virginia Tech
SOFTWARE DESIGN AND ARCHITECTURE
Very Fast containment of Scanning Worms
Architecture of Parallel Computers CSC / ECE 506 Summer 2006 Scalable Programming Models Lecture 11 6/19/2006 Dr Steve Hunter.
IT351: Mobile & Wireless Computing
Architectures of distributed systems Fundamental Models
Architectures of distributed systems Fundamental Models
Chapter 4 Multiprocessors
Architectures of distributed systems
Architectures of distributed systems Fundamental Models
Overview of Networking
Vern Paxson (ICSI) Krste Asanovic (MIT)
Presentation transcript:

Internet Worms Paxson, Asanovic, Dharmapurikar, Lockwood, Pang, Sommer, Weaver Rethinking Hardware Support for Network Analysis and Intrusion Prevention Vern Paxson (ICSI) Krste Asanovic (MIT) Sarang Dharmapurikar (Nuova Systems) John Lockwood (WUSTL) Ruoming Pang (Princeton) Robin Sommer (ICSI) Nicholas Weaver (ICSI) USENIX Hot Security July 31, 2006

Internet Worms Paxson, Asanovic, Dharmapurikar, Lockwood, Pang, Sommer, Weaver Network Analysis Performance Pressures Growing in Multiple Dimensions Increasingly, simple & efficient signature matching proves inadequate False positives Polymorphism Zero-day attacks  We need semantic application-aware analysis But: that costs CPU (parsing) and memory (state)

Internet Worms Paxson, Asanovic, Dharmapurikar, Lockwood, Pang, Sommer, Weaver Network Analysis Performance Pressures Growing in Multiple Dimensions, con’t Attacks inexorably grow in sophistication Arms race (particularly w/ attackers motivated by $$$) Analysis also increasingly requires context (= state) Problem of evasion leads to need to alter traffic via normalization … … so we need to operate in-line Plus we want to prevent attacks, not just detect them … … so we need to operate in-line We need to do a lot more processing ….

Internet Worms Paxson, Asanovic, Dharmapurikar, Lockwood, Pang, Sommer, Weaver Some Sobering Growth Trends Network traffic rates inexorably grow Network traffic volumes inexorably grow We need to do more analysis on larger amounts of data at higher speeds … But CPU performance is NOT inexorably growing any more.

From Hennessy and Patterson, Computer Architecture: A Quantitative Approach, 4th edition, X gap from historical growth Uniprocessor Performance (SPECint)  All major manufacturers moving to multicore architectures  General-purpose uniprocessors have stopped historic performance scaling (no longer able to leverage Moore’s Law) –Power consumption –Wire delays –DRAM access latency –Diminishing returns of more instruction-level parallelism

Internet Worms Paxson, Asanovic, Dharmapurikar, Lockwood, Pang, Sommer, Weaver Where Will We Find The Performance?? FPGAs! ASICs! Multi-core! Parallelism is here and is growing. Yes, that’s what we will use … … but how? … and at what labor cost?

Internet Worms Paxson, Asanovic, Dharmapurikar, Lockwood, Pang, Sommer, Weaver Rethinking Hardware Support … Current efforts in the literature [SP01,FCH02, MLLP03,LMK + 03,CS04,SP04,CMS05,LNZ + 03, DKSL04,DL05,TSCV04,TS05,SL03,SML04,AL05] focus heavily on supporting signature-matching TCAMs, FPGA features, Bloom Filters for string lookups NFAs, DFAs, Aho-Corasick for reg-exp matching Nearly stateless Essentially “Snort in hardware” Rudimentary stateful analysis - TCP stream reassembly w/ adversaries - unexamined in literature until USENIX Security 2005 Commercial designs may be ahead; diff. to know

Internet Worms Paxson, Asanovic, Dharmapurikar, Lockwood, Pang, Sommer, Weaver How Do We Get: Stateful analysis State management in presence of adversaries Semantic rather than syntactic analysis Including at semantic layers spanning multiple connections, hosts, applications In-line processing for normalization, intrusion prevention … expressed so it can leverage tomorrow’s massively parallel processors? And without having to code for hardware specifics?

Internet Worms Paxson, Asanovic, Dharmapurikar, Lockwood, Pang, Sommer, Weaver Task-Level Parallelism in Network Analysis Note: Parallelism means individual forwarding latency needn’t be  sec’s. Cycle budget can be ≈ msec.

Internet Worms Paxson, Asanovic, Dharmapurikar, Lockwood, Pang, Sommer, Weaver Architectural Vision Express high-level (semantic, app-aware, global context) analysis using a high-level language E.g., Bro intrusion detection system Compile these expressions to an abstraction of parallelism E.g., Transactors Retarget these abstractions to different, specific hardware instances (FPGAs, multi-core) to leverage their capabilities and resources

Internet Worms Paxson, Asanovic, Dharmapurikar, Lockwood, Pang, Sommer, Weaver The Transactor Abstraction for Parallelism [AAC + 05, GSA06] Network of computational elements Loosely coupled via FIFOs No timing guarantees between elements Transactor unit includes Local architectural state (persists across transactions) Buffered input/output channels Set of transactions (code) that executes atomically Scheduler that mediates execution & messaging Computation always has a serializable equivalent Properties strive for efficient execution and verifiable specifications

Internet Worms Paxson, Asanovic, Dharmapurikar, Lockwood, Pang, Sommer, Weaver The Transactor Abstraction for Parallelism, con’t

Internet Worms Paxson, Asanovic, Dharmapurikar, Lockwood, Pang, Sommer, Weaver Expressing High-Level Network Analysis At lowest level, handcode analysis primitives for Transactor parallelism abstraction Connection state management, checksum validation, stream reassembly, network/transport normalization At mid-level, construct application protocol analyzers in a custom language (e.g., BinPAC, to appear IMC ‘06) Takes specification of Binary & ASCII protocols, compiles to C++ Retarget to compile to Transactor abstraction At high-level, express analysis in custom language (e.g., Bro) and likewise retarget

Internet Worms Paxson, Asanovic, Dharmapurikar, Lockwood, Pang, Sommer, Weaver Challenges Development of high-quality optimizing compilers For high-level analysis & protocol parsers  Abstraction For Abstraction  hardware instances Management of state and timers Private vs. shared memory

Internet Worms Paxson, Asanovic, Dharmapurikar, Lockwood, Pang, Sommer, Weaver Possibilities A lot of work. But if achieved, can open up network security analysis to much richer and resilient set of capabilities. Furthermore, consider that just about all of the components are not specific to network security analysis but just network analysis in general HW supporting such analysis in-line can change the paradigm of what network forwarding means No longer: send along packets w/ minimal cycles Rather: enable rich, in-depth transformation as the norm

Internet Worms Paxson, Asanovic, Dharmapurikar, Lockwood, Pang, Sommer, Weaver Discussion Goodbye to end-to-end semantics? Opinion: yep :-( Will parallel hardware progress sufficiently? Just one weak link and Amdahl’s Law bites you I.e., can we really keep the processing pipeline full & flowing? Maybe the right answer is a completely different (and inherently parallelizable) model of detection? Opinion: deep knowledge of app semantics is fundamental, remainder follows from that More fundamental parallelism: push work out to edges But how the heck to trust them?