- 1、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。。
- 2、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 3、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
- 4、该文档为VIP文档,如果想要下载,成为VIP会员后,下载免费。
- 5、成为VIP后,下载本文档将扣除1次下载权益。下载后,不支持退款、换文档。如有疑问请联系我们。
- 6、成为VIP后,您将拥有八大权益,权益包括:VIP文档下载权益、阅读免打扰、文档格式转换、高级专利检索、专属身份标志、高级客服、多端互通、版权登记。
- 7、VIP文档为合作方或网友上传,每下载1次, 网站将根据用户上传文档的质量评分、类型等,对文档贡献者给予高额补贴、流量扶持。如果你也想贡献VIP文档。上传文档
查看更多
Rethinking Hardware Support for Network Analysis and Intrusion重新思考网络分析和入侵的硬件支持
Rethinking Hardware Support for Network Analysis and Intrusion Prevention Vern Paxson (ICSI) Krste Asanovic (MIT) Sarang Dharmapurikar (Nuova Systems) John Lockwood (WUSTL) Ruoming Pang (Princeton) Robin Sommer (ICSI) Nicholas Weaver (ICSI) USENIX Hot Security July 31, 2006 Network Analysis Performance Pressures Growing in Multiple Dimensions Increasingly, simple efficient signature matching proves inadequate False positives Polymorphism Zero-day attacks ? We need semantic application-aware analysis But: that costs CPU (parsing) and memory (state) Network Analysis Performance Pressures Growing in Multiple Dimensions, con’t Attacks inexorably grow in sophistication Arms race (particularly w/ attackers motivated by $$$) Analysis also increasingly requires context (= state) Problem of evasion leads to need to alter traffic via normalization … … so we need to operate in-line Plus we want to prevent attacks, not just detect them … … so we need to operate in-line We need to do a lot more processing …. Some Sobering Growth Trends Network traffic rates inexorably grow Network traffic volumes inexorably grow We need to do more analysis on larger amounts of data at higher speeds … But CPU performance is NOT inexorably growing any more. Uniprocessor Performance (SPECint) Where Will We Find The Performance?? FPGAs! ASICs! Multi-core! Parallelism is here and is growing. Yes, that’s what we will use … … but how? … and at what labor cost? Rethinking Hardware Support … Current efforts in the literature [SP01,FCH02, MLLP03,LMK+03,CS04,SP04,CMS05,LNZ+03, DKSL04,DL05,TSCV04,TS05,SL03,SML04,AL05] focus heavily on supporting signature-matching TCAMs, FPGA features, Bloom Filters for string lookups NFAs, DFAs, Aho-Corasick for reg-exp matching Nearly stateless Essentially “Snort in hardware” Rudimentary stateful analysis - TCP stream reassembly w/ adversaries - unexamined in literature until USENIX Security 2005 Commercial designs may be ahead; diff. to know How Do We Get: Stat
您可能关注的文档
- RControlled Vowels TEACHING TOOLKITrcontrolled元音的教学工具.ppt
- RD as Greenhouse Insurance温室气体的研发.ppt
- RBH Issue with ASA L2 Clustering Cisco BlogRBH问题与ASA L2聚类思科博客.pptx
- RC Circuit Delays Electrical and Computer Engineering钢筋混凝土电路延迟电气和计算机工程.ppt
- RDz Workbench for ISPF Developers IBMRDZ台开发商 IBM ISPF.ppt
- RDA and Archives Society of American ArchivistsRDA和档案美国档案工作者协会.ppt
- REACHING GLOBAL MARKETS University of San Diego到达全球市场圣地亚哥大学.ppt
- Reacciones Adversas Enfermera UACh不良反应和#锁起来uach 237.ppt
- RD and Development World Bank研发和发展世界银行.ppt
- Reaching out or missing out Approaches to outreach with伸出或失去的办法来宣传.ppt
- Rethink the Sync EECS同步电子rethink the.ppt
- Retention Current Research and Best Practices保留现有研究与最佳实践.pptx
- Retinitis Pigmentosa SFASUretinitis sfasu色素.ppt
- Retinoblastoma SFASU视网膜母细胞瘤 sfasu.ppt
- Rethinking Text(uality in Digital Context Rice 反思文本质量在数字上下文水稻.ppt
- Rethinking the Subject Feminism and Creative Practice对主题女性主义与创新实践的反思.ppt
- Retina Grand Rounds视网膜大发.ppt
- RETRAINING GRANT PROGRAM WACRAO培训补助计划 wacrao.ppt
- Rethinking Lithium Energy Storage and Battery 锂能源储存与电池的再思考.ppt
- Retirement Reality Check The Edward Group退休现实检查爱德华集团.ppt
原创力文档


文档评论(0)