SF-TAP: Scalable and Flexible Traffic Analysis Platform Running on Commodity Hardware
Yuuki Takano, Ryosuke Miura, Shingo Yasuda Kunio Akashi, Tomoya Inoue
1
in USENIX LISA 2015 NICT, JAIST (Japan)
SF-TAP: Scalable and Flexible Traffic Analysis Platform Running on - - PowerPoint PPT Presentation
SF-TAP: Scalable and Flexible Traffic Analysis Platform Running on Commodity Hardware Yuuki Takano, Ryosuke Miura, Shingo Yasuda Kunio Akashi, Tomoya Inoue 1 in USENIX LISA 2015 NICT, JAIST (Japan) Table of Contents 2 1. Motivation 2.
Yuuki Takano, Ryosuke Miura, Shingo Yasuda Kunio Akashi, Tomoya Inoue
1
in USENIX LISA 2015 NICT, JAIST (Japan)
2
as Python, Ruby, C++, for many purposes (IDS/ IPS, forensic, machine learning).
reconstruction (quite complex).
3
4
5
6
BPF [USENIX ATC 1993] netmap [USENIX ATC 2012] DPDK pcap GASPP [USENIX ATC 2014] SCAP [IMC 2012] libnids libprotoident nDPI l7-filter
(low level traffic capture) (flow oriented analyzer) (application traffic detector)
+ modularity and scalability
7
CPU CPU CPU CPU Flow Abstractor CPU CPU CPU CPU Flow Abstractor CPU CPU CPU CPU Flow Abstractor CPU CPU CPU CPU Flow Abstractor
Cell Incubator
The Internet
SF-TAP Cell SF-TAP Cell SF-TAP Cell SF-TAP Cell Intra Network Core Scaling Core Scaling Core Scaling Core Scaling
Horizontal Scaling
Analyzer Analyzer Analyzer Analyzer Analyzer Analyzer Analyzer Analyzer Analyzer Analyzer Analyzer Analyzer Analyzer Analyzer Analyzer Analyzer
10GbE 10GbE
8
computer resources
be core scalable for efficiency
9
10
NW I/F
HTTP I/F TLS I/F
Flow Abstractor Flow Classifier
TLS Analyzer HTTP Analyzer
HTTP Proxy TCP and UDP Handler
filter and classifier rule
L7 Loopback I/F
DB Forensic IDS/IPS etc... Application Protocol Analyzer etc...
TCP Default I/F UDP Default I/F
Analyzer Plane Abstractor Plane Capturer Plane
SF-TAP Cell Incubator
Flow Identifier Flow Separator
Separator Plane
separated traffic
SF-TAP Cell
L3/L7 Sniffer SSL Proxy etc...
IP Packet Defragmenter
L2 Bridge mirroring traffic
Packet Forwarder
IP Fragment Handler
application level analyzers Forensic, IDS/IPS, etc…
flow abstraction
flow separation
traffic capturing
(ordinary tech.) (users of SF-TAP implements here) (we implemented) (we implemented)
11
SF-TAP Cell Incubator
Flow Separator separated traffic
L2 Bridge
Packet Forwarder
IP Fragment Handler
layer 2 bridge layer 2 frame capture
handle fragmented packets
separate flows to multiple Ifs
12
NW I/F
HTTP I/F TLS I/F
Flow Abstractor Flow Classifier
TCP and UDP Handler
filter and classifier rule
L7 Loopback I/F TCP Default I/F UDP Default I/F Flow Identifier IP Packet Defragmenter
reconstruct TCP flows identify flows by IP and port nothing to do for UDP defragment IP packets if needed
13
NW I/F
HTTP I/F TLS I/F
Flow Abstractor Flow Classifier
TCP and UDP Handler
filter and classifier rule
L7 Loopback I/F TCP Default I/F UDP Default I/F Flow Identifier IP Packet Defragmenter
classify flows by regular expressions
14
(updated from the paper)
15
packet drop against connections per second (pcap) 4K 10K 50K
16
forwarding performance of SF-TAP cell incubator
Mpps
4 8 12 16
fragment size (bytes)
64 128 256 512 1024 ideal (1) α->γ (2) α->β (3) α->β (3) α->γ
1 GbE x 12 10 GbE x 2
α β γ
cell incubator
to γ to β to β and γ
α β γ
protocol analysers
incubator
17
analysis.
in our experiments.
18