Top Banner
Author: Atul Mahajan, Benfano Soewito, Sai K. Parsi, Ning Weng and Haibo Wang Publisher: Proceedings of the 16th international ACM/SIGDA symposium on Field programmable gate arrays, FPGA 2008 Presenter: Chin-Chung Pan Date: 2009/11/11
15

Implementing High-speed String Matching Hardware for Network Intrusion Detection Systems

Jan 01, 2016

Download

Documents

ila-richard

Implementing High-speed String Matching Hardware for Network Intrusion Detection Systems. Author: Atul Mahajan, Benfano Soewito, Sai K. Parsi, Ning Weng and Haibo Wang Publisher: Proceedings of the 16th international ACM/SIGDA symposium on Field programmable gate arrays, FPGA  2008 Presenter: - PowerPoint PPT Presentation
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Implementing High-speed String Matching Hardware for Network Intrusion Detection Systems

Author:Atul Mahajan, Benfano Soewito, Sai K. Parsi, Ning Weng and Haibo Wang

Publisher:Proceedings of the 16th international ACM/SIGDA symposium on Field programmable gate arrays, FPGA 2008

Presenter: Chin-Chung Pan

Date: 2009/11/11

Page 2: Implementing High-speed String Matching Hardware for Network Intrusion Detection Systems

OutlineIntroductionTechniques for high-throughput verifier

DesignMulti-threading FSMHigh-speed interface circuit designMinimizing FSM interconnect delay

Experimental Results

2

Page 3: Implementing High-speed String Matching Hardware for Network Intrusion Detection Systems

IntroductionThe classifier arranges incoming packets into three

categories: malicious, suspected or benign.Only suspected packets are fed to FSMs (verifiers) for further

verification. In addition, classifiers confine the patterns that need to be checked for each suspected packet.

3

Page 4: Implementing High-speed String Matching Hardware for Network Intrusion Detection Systems

OutlineIntroductionTechniques for high-throughput verifier

DesignMulti-threading FSMHigh-speed interface circuit designMinimizing FSM interconnect delay

Experimental Results

4

Page 5: Implementing High-speed String Matching Hardware for Network Intrusion Detection Systems

Multi-threading FSM

5

We use P[i] to represent the ith byte of the packet to be examined by the FSM. S[i] denotes the state that FSM reaches after reading the ith byte of the packet.

Page 6: Implementing High-speed String Matching Hardware for Network Intrusion Detection Systems

Multi-threading FSMDuring the odd clock cycles, data from Packet P1 are fed to the FSM. In an even

clock cycle, the FSM takes input from Packet P2.

6

Page 7: Implementing High-speed String Matching Hardware for Network Intrusion Detection Systems

High-speed interface circuit design

7

P1[1]P1[2]P1[3]P1[4] P1[1]P2[2]P2[3]P2[4] P2[1]

Page 8: Implementing High-speed String Matching Hardware for Network Intrusion Detection Systems

Minimizing FSM interconnect delay the input packet path not only has large fan-out but also

travels long distance.

8

Page 9: Implementing High-speed String Matching Hardware for Network Intrusion Detection Systems

Minimizing FSM interconnect delay

10

P1[1] P1[2]P1[1]

P1[1]

P1[2]

P2[1] P2[2]P2[1]

P2[1]

P2[2]

P1[1]P1[2]

P2[1]P2[2]

ABCD

EFGH AB CD

EF GH

IJ KL

Page 10: Implementing High-speed String Matching Hardware for Network Intrusion Detection Systems

OutlineIntroductionTechniques for high-throughput verifier

DesignMulti-threading FSMHigh-speed interface circuit designMinimizing FSM interconnect delay

Experimental Results

11

Page 11: Implementing High-speed String Matching Hardware for Network Intrusion Detection Systems

Experimental ResultsFSM clock frequency versus number of threads. It’s maximum throughput

is above 4 Gbits/s.

12

Page 12: Implementing High-speed String Matching Hardware for Network Intrusion Detection Systems

Experimental ResultsInterconnect delay with different FSM sizes.

13

Page 13: Implementing High-speed String Matching Hardware for Network Intrusion Detection Systems

Experimental ResultsDFF utilization in multi-threading FSMs.

14

Page 14: Implementing High-speed String Matching Hardware for Network Intrusion Detection Systems

Experimental ResultsThe design approaches used in the study are: (a) a single FSM with

the size of 200, (b) two FSMs of the size 100, and (c) four FSMs of the size 50.

15

Page 15: Implementing High-speed String Matching Hardware for Network Intrusion Detection Systems

Experimental ResultsAfter four pipeline stages are added to some input path branches, the delay

of partitioned interconnect segments can be quickly reduced to less than 2ns. The FSMs operation at the clock frequency of 500MHz.

16