multi pattern signature matching for hardware network
play

Multi-pattern Signature Matching for Hardware Network Intrusion - PDF document

Multi-pattern Signature Matching for Hardware Network Intrusion Detection Systems, by Haoyu Song and John W. Lockwood, IEEE Globecom 2005, St. Louis, MO, Nov. 28, 2005, pp. CN-02-3. Multi-pattern Signature Matching for Hardware Network Intrusion


  1. Multi-pattern Signature Matching for Hardware Network Intrusion Detection Systems, by Haoyu Song and John W. Lockwood, IEEE Globecom 2005, St. Louis, MO, Nov. 28, 2005, pp. CN-02-3. Multi-pattern Signature Matching for Hardware Network Intrusion Detection Systems Haoyu Song, John W. Lockwood { hs1, lockwood } @arl.wustl.edu Department of Computer Science and Engineering Washington University in St. Louis, USA, 63130 In this paper, we review the related work in Section II and Abstract — Network Intrusion Detection System (NIDS) per- forms deep inspections on the packet payload to identify, deter then discuss our data structure and algorithms in Section III. and contain the malicious attacks over the Internet. It needs A theoretical analysis and simulations follow in Section IV to perform exact matching on multi-pattern signatures in real and V. Some improvements are presented in Section VI to time. In this paper we introduce an efficient data structure called further reduce the memory usage and boost the performance. Extended Bloom Filter (EBF) and the corresponding algorithm The scheme to reduce the number of EBFs is introduced in to perform the multi-pattern signature matching. We also present a technique to support long signature matching so that we VII. We briefly talk about the hardware NIDS implementation need only to maintain a limited number of supported signature in Section VIII and conclude our contribution in Section IX. lengths for the EBFs. We show that at reasonable hardware cost we can achieve very fast and almost time-deterministic exact II. R ELATED W ORK matching for thousands of signatures. The architecture takes the Given a packet payload T of length n and a set of m signa- advantages of embedded multi-port memories in FPGAs and can be used to build a full-featured hardware-based NIDS. tures S [1] ... S [ m ] of variable length for intrusion detection, the signature-matching problem is to determine any exact match of signature S [ i ] and a substring of T . In NIDS, signature I. I NTRODUCTION matching is a crucial component and decides the overall Some content strings of Internet packet payload, also known system performance. An analysis shows that in Snort, an open- as “signatures,” imply network intrusion attempts. Signature- source software-based NIDS, the signature matching alone based Network Intrusion Detection System (NIDS) collects consumes 30% to 80% of the CPU time [9]. While the network these signatures and scans the payload of the Internet packets bandwidth and the size of the signature set keep growing, to for them in order to identify, deter and contain such malicious perform real time detection is still far from realistic. behaviors. A scalable and fast solution is needed to accom- Boyer-Moore is the best-known algorithm for single string modate the largest signature set today and to sustain the real matching and is actually adopted for the implementation of the time processing of the high-speed network. Snort. Fisk extended the Boyer-Moore algorithm to support Bloom Filter [4] is an efficient data structure enabling fast set-wise string matching [8]. Coit does similar work in [5]. membership query with tunable false positive rate. Dharma- Aho-Corasick [2] is a finite state automaton supporting multi- purikar et al have designed a multi-pattern signature-matching pattern string matching. The major drawback is its excessive scheme using Bloom Filters [6]. On the scan process, when- memory consuming. A modified algorithm of Aho-Corasick ever the front-end Bloom Filter reports a possible match, the due to Tuck [14] reduces the amount of memory and improves string is extracted and used to probe another independent hash its performance. Wu-Manber [15] uses a hash table plus the table to decide the final match. There are two drawbacks in bad character heuristics to accelerate the searching speed. All this scheme. Firstly, the extra lookups in the hash table might these algorithms are developed mainly for software imple- become the performance bottleneck due to the hash collisions. mentation. Analysis and experiments show no such algorithm Secondly, there are many different signature lengths and the is fast enough for real-time string matching in high-speed signature distribution on length is unbalanced, so to assign network. Thus, a hardware-assisted or pure hardware solution each length a Bloom Filter is inefficient in memory usage. is becoming more and more attractive. We find that the scheme does not effectively use the Sidhu [12] implemented Nondeterministic Finite Automaton information revealed by the Bloom Filters and there is little (NFA) in hardware and later Moscola [10] implemented De- consideration about the string load balancing among different terministic Finite Automaton (DFA) in hardware to perform Bloom Filters. To overcome these drawbacks, we propose an regular expression matching. While the match speed is fast, extension of the Bloom Filter data structure and a new lookup they both suffer the scalability problem: Too many states algorithm named Extended Bloom Filter (EBF). It is scalable consume too many hardware resources. Dharmapurikar then and suitable for fast incremental updates. The hardware-based proposed to use Bloom Filters to do the deep packet inspection EBF is an alternative of the multi-pattern signature-matching [6]. Attig implemented a prototype of this scheme [3]. Our problem and outperforms the software-based algorithms. paper proposes significant improvement to this work and 0-7803-9415-1/05/$20.00 (C) 2005 IEEE This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE GLOBECOM 2005 proceedings.

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend