A Workload for Evaluating Deep Packet Inspection Architectures

被引:0
|
作者
Becchi, Michela [1 ]
Franklin, Mark [1 ]
Crowley, Patrick [1 ]
机构
[1] Washington Univ, Dept Comp Sci & Engn, St Louis, MO 63130 USA
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
High-speed content inspection of network traffic is an important new application area for programmable networking systems, and has recently led to several proposals for high-performance regular expression matching. At the same time, the number and complexity of the patterns present in well-known network intrusion detection systems has been rapidly increasing. This increase is important since both the practicality and the performance of specific pattern matching designs are strictly dependent upon characteristics of the underlying regular expression set. However, a commonly agreed upon workload for the evaluation of deep packet inspection architectures is still missing, leading to frequent unfair comparisons, and to designs lacking in generality or scalability. In this paper, we propose a workload for the evaluation of regular expression matching architectures. The workload includes a regular expression model and a traffic generator, with the former characterizing different levels of expressiveness within rule-sets and, the latter characterizing varying degrees of malicious network activity. The proposed workload is used here to evaluate designs (e.g., different memory layouts and hardware organizations) where the matching algorithm is based on compressed deterministic and non deterministic finite automata (DFAs and NFAs).
引用
收藏
页码:73 / 83
页数:11
相关论文
共 50 条
  • [41] Deep packet inspection using parallel bloom filters
    Dharmapurikar, S
    Krishnamurthy, P
    Sproull, T
    Lockwood, J
    [J]. HOT INTERCONNECTS 11, 2003, : 44 - 51
  • [42] Deep Packet Inspection using Finate State Machines
    Krishna, B. Murali
    Sankar, G. N. V. Siva
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON CONTROL AUTOMATION, COMMUNICATION AND ENERGY CONSERVATION INCACEC 2009 VOLUME II, 2009, : 635 - 645
  • [43] Bandwidth Management - A Deep Packet Inspection Mathematical Model
    Niang, Boudal
    [J]. 2014 6TH INTERNATIONAL CONGRESS ON ULTRA MODERN TELECOMMUNICATIONS AND CONTROL SYSTEMS AND WORKSHOPS (ICUMT), 2014, : 169 - 175
  • [44] Mobile security using separated deep packet inspection
    Jacoby, Grant A.
    Mosley, Shawn
    [J]. 2008 5TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-3, 2008, : 482 - 487
  • [45] BlindBox: Deep Packet Inspection over Encrypted Traffic
    Sherry, Justine
    Lan, Chang
    Popa, Raluca Ada
    Ratnasamy, Sylvia
    [J]. SIGCOMM'15: PROCEEDINGS OF THE 2015 ACM CONFERENCE ON SPECIAL INTEREST GROUP ON DATA COMMUNICATION, 2015, : 213 - 226
  • [46] DPI & DFI: a Malicious Behavior Detection Method Combining Deep Packet Inspection and Deep Flow Inspection
    Guo, Yu -tong
    Gao, Yang
    Wang, Yan
    Qin, Meng-yuan
    Pu, Yu-jie
    Wang, Zeng
    Liu, Dan-dan
    Chen, Xiang-jun
    Gao, Tian-fng
    Lv, Ting-ting
    Fu, Zhong-chuan
    [J]. 13TH GLOBAL CONGRESS ON MANUFACTURING AND MANAGEMENT, 2017, 174 : 1309 - 1314
  • [47] Unsupervised Clustering of Honeypot Attacks by Deep HTTP Packet Inspection
    Aurora, Victor
    Neal, Christopher
    Proulx, Alexandre
    Cuppens, Nora Boulahia
    Cuppens, Frederic
    [J]. FOUNDATIONS AND PRACTICE OF SECURITY, PT I, FPS 2023, 2024, 14551 : 53 - 68
  • [48] Hardware acceleration of regular expression repetitions in deep packet inspection
    Cronin, Brendan
    Wang, Xiaojun
    [J]. IET INFORMATION SECURITY, 2013, 7 (04) : 327 - 335
  • [49] Privacy-enhanced Deep Packet Inspection at Outsourced Middlebox
    Li, Hongwei
    Ren, Hao
    Liu, Dongxiao
    Shen, Xuemin
    [J]. 2018 10TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS AND SIGNAL PROCESSING (WCSP), 2018,
  • [50] Boundary hash for memory-efficient Deep Packet Inspection
    Artan, N. Sertac
    Bando, Masanori
    Chao, H. Jonathan
    [J]. 2008 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, PROCEEDINGS, VOLS 1-13, 2008, : 1732 - 1737