High-performance hardware monitors to protect network processors from data plane attacks

The Internet represents an essential communication infrastructure that needs to be protected from malicious attacks. Modern network routers are typically implemented using embedded multi-core network processors that are inherently vulnerable to attack. Hardware monitor subsystems, which can verify t...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Chandrikakutty, Harikrishnan, Unnikrishnan, Deepak, Tessier, Russell, Wolf, Tilman
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 6
container_issue
container_start_page 1
container_title
container_volume
creator Chandrikakutty, Harikrishnan
Unnikrishnan, Deepak
Tessier, Russell
Wolf, Tilman
description The Internet represents an essential communication infrastructure that needs to be protected from malicious attacks. Modern network routers are typically implemented using embedded multi-core network processors that are inherently vulnerable to attack. Hardware monitor subsystems, which can verify the behavior of a router's packet processing system at runtime, can be used to identify and respond to an ever-changing range of attacks. While hardware monitors have primarily been described in the context of general-purpose computing, our work focuses on two important aspects that are relevant to the embedded networking domain: We present the design and prototype implementation of a high-performance monitor that can track each processor instruction with low memory overhead. Additionally, our monitor is capable of defending against attacks on processors with a Harvard architecture, the dominant contemporary network processor organization. We demonstrate that our monitor architecture provides no network slowdown in the absence of an attack and provides the capability to drop attack packets without otherwise affecting regular network traffic when an attack occurs.
doi_str_mv 10.1145/2463209.2488832
format Conference Proceeding
fullrecord <record><control><sourceid>acm_6IE</sourceid><recordid>TN_cdi_acm_books_10_1145_2463209_2488832</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6560673</ieee_id><sourcerecordid>acm_books_10_1145_2463209_2488832</sourcerecordid><originalsourceid>FETCH-LOGICAL-a247t-4ee811dcdcb9511f3f97ac3ff36765f004514359d333e274c2ae26999293f443</originalsourceid><addsrcrecordid>eNqNkDFPwzAQhY0ACSidGVg8sqTYPseOR1QBRarE0qGb5TpnGtrEkWOp4t-Tqh0YmU7vfU83fIQ8cDbjXJbPQioQzMyErKoKxAW5G1s2Vpqry7_hitwyDVXBGVvfkOkwfDPGOIdKGH1L1ovma1v0mEJMres80q1L9cElpG3smhzTQHOkfYoZfaYd5kNMu2P2OAxHGlJsae2yo_3edUhdzs7vhntyHdx-wOn5Tsjq7XU1XxTLz_eP-cuycELqXEjEivPa135jSs4DBKOdhxBAaVUGxmTJJZSmBgAUWnrhUChjjDAQpIQJeTy9bRDR9qlpXfqxqlRMaRjp04k639pNjLvBcmaP_uzZnz37G6ezf07tJjUY4BfvBGye</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>High-performance hardware monitors to protect network processors from data plane attacks</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Chandrikakutty, Harikrishnan ; Unnikrishnan, Deepak ; Tessier, Russell ; Wolf, Tilman</creator><creatorcontrib>Chandrikakutty, Harikrishnan ; Unnikrishnan, Deepak ; Tessier, Russell ; Wolf, Tilman</creatorcontrib><description>The Internet represents an essential communication infrastructure that needs to be protected from malicious attacks. Modern network routers are typically implemented using embedded multi-core network processors that are inherently vulnerable to attack. Hardware monitor subsystems, which can verify the behavior of a router's packet processing system at runtime, can be used to identify and respond to an ever-changing range of attacks. While hardware monitors have primarily been described in the context of general-purpose computing, our work focuses on two important aspects that are relevant to the embedded networking domain: We present the design and prototype implementation of a high-performance monitor that can track each processor instruction with low memory overhead. Additionally, our monitor is capable of defending against attacks on processors with a Harvard architecture, the dominant contemporary network processor organization. We demonstrate that our monitor architecture provides no network slowdown in the absence of an attack and provides the capability to drop attack packets without otherwise affecting regular network traffic when an attack occurs.</description><identifier>ISSN: 0738-100X</identifier><identifier>ISBN: 1450320716</identifier><identifier>ISBN: 9781450320719</identifier><identifier>EISBN: 1450320716</identifier><identifier>EISBN: 9781450320719</identifier><identifier>DOI: 10.1145/2463209.2488832</identifier><language>eng</language><publisher>New York, NY, USA: ACM</publisher><subject>Automata ; Benchmark testing ; Doped fiber amplifiers ; Hardware ; Monitoring ; Networks -- Network components -- Intermediate nodes -- Routers ; Networks -- Network services -- Network monitoring ; Program processors ; Security ; Security and privacy ; Social and professional topics -- Computing -- technology policy -- Computer crime</subject><ispartof>2013 50th ACM/EDAC/IEEE Design Automation Conference (DAC), 2013, p.1-6</ispartof><rights>2013 ACM</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6560673$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,777,781,786,787,793,2052,27906,54739,54901</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/6560673$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Chandrikakutty, Harikrishnan</creatorcontrib><creatorcontrib>Unnikrishnan, Deepak</creatorcontrib><creatorcontrib>Tessier, Russell</creatorcontrib><creatorcontrib>Wolf, Tilman</creatorcontrib><title>High-performance hardware monitors to protect network processors from data plane attacks</title><title>2013 50th ACM/EDAC/IEEE Design Automation Conference (DAC)</title><addtitle>DAC</addtitle><description>The Internet represents an essential communication infrastructure that needs to be protected from malicious attacks. Modern network routers are typically implemented using embedded multi-core network processors that are inherently vulnerable to attack. Hardware monitor subsystems, which can verify the behavior of a router's packet processing system at runtime, can be used to identify and respond to an ever-changing range of attacks. While hardware monitors have primarily been described in the context of general-purpose computing, our work focuses on two important aspects that are relevant to the embedded networking domain: We present the design and prototype implementation of a high-performance monitor that can track each processor instruction with low memory overhead. Additionally, our monitor is capable of defending against attacks on processors with a Harvard architecture, the dominant contemporary network processor organization. We demonstrate that our monitor architecture provides no network slowdown in the absence of an attack and provides the capability to drop attack packets without otherwise affecting regular network traffic when an attack occurs.</description><subject>Automata</subject><subject>Benchmark testing</subject><subject>Doped fiber amplifiers</subject><subject>Hardware</subject><subject>Monitoring</subject><subject>Networks -- Network components -- Intermediate nodes -- Routers</subject><subject>Networks -- Network services -- Network monitoring</subject><subject>Program processors</subject><subject>Security</subject><subject>Security and privacy</subject><subject>Social and professional topics -- Computing -- technology policy -- Computer crime</subject><issn>0738-100X</issn><isbn>1450320716</isbn><isbn>9781450320719</isbn><isbn>1450320716</isbn><isbn>9781450320719</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2013</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNqNkDFPwzAQhY0ACSidGVg8sqTYPseOR1QBRarE0qGb5TpnGtrEkWOp4t-Tqh0YmU7vfU83fIQ8cDbjXJbPQioQzMyErKoKxAW5G1s2Vpqry7_hitwyDVXBGVvfkOkwfDPGOIdKGH1L1ovma1v0mEJMres80q1L9cElpG3smhzTQHOkfYoZfaYd5kNMu2P2OAxHGlJsae2yo_3edUhdzs7vhntyHdx-wOn5Tsjq7XU1XxTLz_eP-cuycELqXEjEivPa135jSs4DBKOdhxBAaVUGxmTJJZSmBgAUWnrhUChjjDAQpIQJeTy9bRDR9qlpXfqxqlRMaRjp04k639pNjLvBcmaP_uzZnz37G6ezf07tJjUY4BfvBGye</recordid><startdate>20130529</startdate><enddate>20130529</enddate><creator>Chandrikakutty, Harikrishnan</creator><creator>Unnikrishnan, Deepak</creator><creator>Tessier, Russell</creator><creator>Wolf, Tilman</creator><general>ACM</general><general>IEEE</general><scope>6IE</scope><scope>6IH</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIO</scope></search><sort><creationdate>20130529</creationdate><title>High-performance hardware monitors to protect network processors from data plane attacks</title><author>Chandrikakutty, Harikrishnan ; Unnikrishnan, Deepak ; Tessier, Russell ; Wolf, Tilman</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-a247t-4ee811dcdcb9511f3f97ac3ff36765f004514359d333e274c2ae26999293f443</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2013</creationdate><topic>Automata</topic><topic>Benchmark testing</topic><topic>Doped fiber amplifiers</topic><topic>Hardware</topic><topic>Monitoring</topic><topic>Networks -- Network components -- Intermediate nodes -- Routers</topic><topic>Networks -- Network services -- Network monitoring</topic><topic>Program processors</topic><topic>Security</topic><topic>Security and privacy</topic><topic>Social and professional topics -- Computing -- technology policy -- Computer crime</topic><toplevel>online_resources</toplevel><creatorcontrib>Chandrikakutty, Harikrishnan</creatorcontrib><creatorcontrib>Unnikrishnan, Deepak</creatorcontrib><creatorcontrib>Tessier, Russell</creatorcontrib><creatorcontrib>Wolf, Tilman</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan (POP) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP) 1998-present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Chandrikakutty, Harikrishnan</au><au>Unnikrishnan, Deepak</au><au>Tessier, Russell</au><au>Wolf, Tilman</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>High-performance hardware monitors to protect network processors from data plane attacks</atitle><btitle>2013 50th ACM/EDAC/IEEE Design Automation Conference (DAC)</btitle><stitle>DAC</stitle><date>2013-05-29</date><risdate>2013</risdate><spage>1</spage><epage>6</epage><pages>1-6</pages><issn>0738-100X</issn><isbn>1450320716</isbn><isbn>9781450320719</isbn><eisbn>1450320716</eisbn><eisbn>9781450320719</eisbn><abstract>The Internet represents an essential communication infrastructure that needs to be protected from malicious attacks. Modern network routers are typically implemented using embedded multi-core network processors that are inherently vulnerable to attack. Hardware monitor subsystems, which can verify the behavior of a router's packet processing system at runtime, can be used to identify and respond to an ever-changing range of attacks. While hardware monitors have primarily been described in the context of general-purpose computing, our work focuses on two important aspects that are relevant to the embedded networking domain: We present the design and prototype implementation of a high-performance monitor that can track each processor instruction with low memory overhead. Additionally, our monitor is capable of defending against attacks on processors with a Harvard architecture, the dominant contemporary network processor organization. We demonstrate that our monitor architecture provides no network slowdown in the absence of an attack and provides the capability to drop attack packets without otherwise affecting regular network traffic when an attack occurs.</abstract><cop>New York, NY, USA</cop><pub>ACM</pub><doi>10.1145/2463209.2488832</doi><tpages>6</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 0738-100X
ispartof 2013 50th ACM/EDAC/IEEE Design Automation Conference (DAC), 2013, p.1-6
issn 0738-100X
language eng
recordid cdi_acm_books_10_1145_2463209_2488832
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Automata
Benchmark testing
Doped fiber amplifiers
Hardware
Monitoring
Networks -- Network components -- Intermediate nodes -- Routers
Networks -- Network services -- Network monitoring
Program processors
Security
Security and privacy
Social and professional topics -- Computing -- technology policy -- Computer crime
title High-performance hardware monitors to protect network processors from data plane attacks
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-18T01%3A59%3A34IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-acm_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=High-performance%20hardware%20monitors%20to%20protect%20network%20processors%20from%20data%20plane%20attacks&rft.btitle=2013%2050th%20ACM/EDAC/IEEE%20Design%20Automation%20Conference%20(DAC)&rft.au=Chandrikakutty,%20Harikrishnan&rft.date=2013-05-29&rft.spage=1&rft.epage=6&rft.pages=1-6&rft.issn=0738-100X&rft.isbn=1450320716&rft.isbn_list=9781450320719&rft_id=info:doi/10.1145/2463209.2488832&rft_dat=%3Cacm_6IE%3Eacm_books_10_1145_2463209_2488832%3C/acm_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=1450320716&rft.eisbn_list=9781450320719&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=6560673&rfr_iscdi=true