High-performance hardware monitors to protect network processors from data plane attacks
The Internet represents an essential communication infrastructure that needs to be protected from malicious attacks. Modern network routers are typically implemented using embedded multi-core network processors that are inherently vulnerable to attack. Hardware monitor subsystems, which can verify t...
Gespeichert in:
Hauptverfasser: | , , , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 6 |
---|---|
container_issue | |
container_start_page | 1 |
container_title | |
container_volume | |
creator | Chandrikakutty, Harikrishnan Unnikrishnan, Deepak Tessier, Russell Wolf, Tilman |
description | The Internet represents an essential communication infrastructure that needs to be protected from malicious attacks. Modern network routers are typically implemented using embedded multi-core network processors that are inherently vulnerable to attack. Hardware monitor subsystems, which can verify the behavior of a router's packet processing system at runtime, can be used to identify and respond to an ever-changing range of attacks. While hardware monitors have primarily been described in the context of general-purpose computing, our work focuses on two important aspects that are relevant to the embedded networking domain: We present the design and prototype implementation of a high-performance monitor that can track each processor instruction with low memory overhead. Additionally, our monitor is capable of defending against attacks on processors with a Harvard architecture, the dominant contemporary network processor organization. We demonstrate that our monitor architecture provides no network slowdown in the absence of an attack and provides the capability to drop attack packets without otherwise affecting regular network traffic when an attack occurs. |
doi_str_mv | 10.1145/2463209.2488832 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>acm_6IE</sourceid><recordid>TN_cdi_acm_books_10_1145_2463209_2488832</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6560673</ieee_id><sourcerecordid>acm_books_10_1145_2463209_2488832</sourcerecordid><originalsourceid>FETCH-LOGICAL-a247t-4ee811dcdcb9511f3f97ac3ff36765f004514359d333e274c2ae26999293f443</originalsourceid><addsrcrecordid>eNqNkDFPwzAQhY0ACSidGVg8sqTYPseOR1QBRarE0qGb5TpnGtrEkWOp4t-Tqh0YmU7vfU83fIQ8cDbjXJbPQioQzMyErKoKxAW5G1s2Vpqry7_hitwyDVXBGVvfkOkwfDPGOIdKGH1L1ovma1v0mEJMres80q1L9cElpG3smhzTQHOkfYoZfaYd5kNMu2P2OAxHGlJsae2yo_3edUhdzs7vhntyHdx-wOn5Tsjq7XU1XxTLz_eP-cuycELqXEjEivPa135jSs4DBKOdhxBAaVUGxmTJJZSmBgAUWnrhUChjjDAQpIQJeTy9bRDR9qlpXfqxqlRMaRjp04k639pNjLvBcmaP_uzZnz37G6ezf07tJjUY4BfvBGye</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>High-performance hardware monitors to protect network processors from data plane attacks</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Chandrikakutty, Harikrishnan ; Unnikrishnan, Deepak ; Tessier, Russell ; Wolf, Tilman</creator><creatorcontrib>Chandrikakutty, Harikrishnan ; Unnikrishnan, Deepak ; Tessier, Russell ; Wolf, Tilman</creatorcontrib><description>The Internet represents an essential communication infrastructure that needs to be protected from malicious attacks. Modern network routers are typically implemented using embedded multi-core network processors that are inherently vulnerable to attack. Hardware monitor subsystems, which can verify the behavior of a router's packet processing system at runtime, can be used to identify and respond to an ever-changing range of attacks. While hardware monitors have primarily been described in the context of general-purpose computing, our work focuses on two important aspects that are relevant to the embedded networking domain: We present the design and prototype implementation of a high-performance monitor that can track each processor instruction with low memory overhead. Additionally, our monitor is capable of defending against attacks on processors with a Harvard architecture, the dominant contemporary network processor organization. We demonstrate that our monitor architecture provides no network slowdown in the absence of an attack and provides the capability to drop attack packets without otherwise affecting regular network traffic when an attack occurs.</description><identifier>ISSN: 0738-100X</identifier><identifier>ISBN: 1450320716</identifier><identifier>ISBN: 9781450320719</identifier><identifier>EISBN: 1450320716</identifier><identifier>EISBN: 9781450320719</identifier><identifier>DOI: 10.1145/2463209.2488832</identifier><language>eng</language><publisher>New York, NY, USA: ACM</publisher><subject>Automata ; Benchmark testing ; Doped fiber amplifiers ; Hardware ; Monitoring ; Networks -- Network components -- Intermediate nodes -- Routers ; Networks -- Network services -- Network monitoring ; Program processors ; Security ; Security and privacy ; Social and professional topics -- Computing -- technology policy -- Computer crime</subject><ispartof>2013 50th ACM/EDAC/IEEE Design Automation Conference (DAC), 2013, p.1-6</ispartof><rights>2013 ACM</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6560673$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,777,781,786,787,793,2052,27906,54739,54901</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/6560673$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Chandrikakutty, Harikrishnan</creatorcontrib><creatorcontrib>Unnikrishnan, Deepak</creatorcontrib><creatorcontrib>Tessier, Russell</creatorcontrib><creatorcontrib>Wolf, Tilman</creatorcontrib><title>High-performance hardware monitors to protect network processors from data plane attacks</title><title>2013 50th ACM/EDAC/IEEE Design Automation Conference (DAC)</title><addtitle>DAC</addtitle><description>The Internet represents an essential communication infrastructure that needs to be protected from malicious attacks. Modern network routers are typically implemented using embedded multi-core network processors that are inherently vulnerable to attack. Hardware monitor subsystems, which can verify the behavior of a router's packet processing system at runtime, can be used to identify and respond to an ever-changing range of attacks. While hardware monitors have primarily been described in the context of general-purpose computing, our work focuses on two important aspects that are relevant to the embedded networking domain: We present the design and prototype implementation of a high-performance monitor that can track each processor instruction with low memory overhead. Additionally, our monitor is capable of defending against attacks on processors with a Harvard architecture, the dominant contemporary network processor organization. We demonstrate that our monitor architecture provides no network slowdown in the absence of an attack and provides the capability to drop attack packets without otherwise affecting regular network traffic when an attack occurs.</description><subject>Automata</subject><subject>Benchmark testing</subject><subject>Doped fiber amplifiers</subject><subject>Hardware</subject><subject>Monitoring</subject><subject>Networks -- Network components -- Intermediate nodes -- Routers</subject><subject>Networks -- Network services -- Network monitoring</subject><subject>Program processors</subject><subject>Security</subject><subject>Security and privacy</subject><subject>Social and professional topics -- Computing -- technology policy -- Computer crime</subject><issn>0738-100X</issn><isbn>1450320716</isbn><isbn>9781450320719</isbn><isbn>1450320716</isbn><isbn>9781450320719</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2013</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNqNkDFPwzAQhY0ACSidGVg8sqTYPseOR1QBRarE0qGb5TpnGtrEkWOp4t-Tqh0YmU7vfU83fIQ8cDbjXJbPQioQzMyErKoKxAW5G1s2Vpqry7_hitwyDVXBGVvfkOkwfDPGOIdKGH1L1ovma1v0mEJMres80q1L9cElpG3smhzTQHOkfYoZfaYd5kNMu2P2OAxHGlJsae2yo_3edUhdzs7vhntyHdx-wOn5Tsjq7XU1XxTLz_eP-cuycELqXEjEivPa135jSs4DBKOdhxBAaVUGxmTJJZSmBgAUWnrhUChjjDAQpIQJeTy9bRDR9qlpXfqxqlRMaRjp04k639pNjLvBcmaP_uzZnz37G6ezf07tJjUY4BfvBGye</recordid><startdate>20130529</startdate><enddate>20130529</enddate><creator>Chandrikakutty, Harikrishnan</creator><creator>Unnikrishnan, Deepak</creator><creator>Tessier, Russell</creator><creator>Wolf, Tilman</creator><general>ACM</general><general>IEEE</general><scope>6IE</scope><scope>6IH</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIO</scope></search><sort><creationdate>20130529</creationdate><title>High-performance hardware monitors to protect network processors from data plane attacks</title><author>Chandrikakutty, Harikrishnan ; Unnikrishnan, Deepak ; Tessier, Russell ; Wolf, Tilman</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-a247t-4ee811dcdcb9511f3f97ac3ff36765f004514359d333e274c2ae26999293f443</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2013</creationdate><topic>Automata</topic><topic>Benchmark testing</topic><topic>Doped fiber amplifiers</topic><topic>Hardware</topic><topic>Monitoring</topic><topic>Networks -- Network components -- Intermediate nodes -- Routers</topic><topic>Networks -- Network services -- Network monitoring</topic><topic>Program processors</topic><topic>Security</topic><topic>Security and privacy</topic><topic>Social and professional topics -- Computing -- technology policy -- Computer crime</topic><toplevel>online_resources</toplevel><creatorcontrib>Chandrikakutty, Harikrishnan</creatorcontrib><creatorcontrib>Unnikrishnan, Deepak</creatorcontrib><creatorcontrib>Tessier, Russell</creatorcontrib><creatorcontrib>Wolf, Tilman</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan (POP) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP) 1998-present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Chandrikakutty, Harikrishnan</au><au>Unnikrishnan, Deepak</au><au>Tessier, Russell</au><au>Wolf, Tilman</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>High-performance hardware monitors to protect network processors from data plane attacks</atitle><btitle>2013 50th ACM/EDAC/IEEE Design Automation Conference (DAC)</btitle><stitle>DAC</stitle><date>2013-05-29</date><risdate>2013</risdate><spage>1</spage><epage>6</epage><pages>1-6</pages><issn>0738-100X</issn><isbn>1450320716</isbn><isbn>9781450320719</isbn><eisbn>1450320716</eisbn><eisbn>9781450320719</eisbn><abstract>The Internet represents an essential communication infrastructure that needs to be protected from malicious attacks. Modern network routers are typically implemented using embedded multi-core network processors that are inherently vulnerable to attack. Hardware monitor subsystems, which can verify the behavior of a router's packet processing system at runtime, can be used to identify and respond to an ever-changing range of attacks. While hardware monitors have primarily been described in the context of general-purpose computing, our work focuses on two important aspects that are relevant to the embedded networking domain: We present the design and prototype implementation of a high-performance monitor that can track each processor instruction with low memory overhead. Additionally, our monitor is capable of defending against attacks on processors with a Harvard architecture, the dominant contemporary network processor organization. We demonstrate that our monitor architecture provides no network slowdown in the absence of an attack and provides the capability to drop attack packets without otherwise affecting regular network traffic when an attack occurs.</abstract><cop>New York, NY, USA</cop><pub>ACM</pub><doi>10.1145/2463209.2488832</doi><tpages>6</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 0738-100X |
ispartof | 2013 50th ACM/EDAC/IEEE Design Automation Conference (DAC), 2013, p.1-6 |
issn | 0738-100X |
language | eng |
recordid | cdi_acm_books_10_1145_2463209_2488832 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Automata Benchmark testing Doped fiber amplifiers Hardware Monitoring Networks -- Network components -- Intermediate nodes -- Routers Networks -- Network services -- Network monitoring Program processors Security Security and privacy Social and professional topics -- Computing -- technology policy -- Computer crime |
title | High-performance hardware monitors to protect network processors from data plane attacks |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-18T01%3A59%3A34IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-acm_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=High-performance%20hardware%20monitors%20to%20protect%20network%20processors%20from%20data%20plane%20attacks&rft.btitle=2013%2050th%20ACM/EDAC/IEEE%20Design%20Automation%20Conference%20(DAC)&rft.au=Chandrikakutty,%20Harikrishnan&rft.date=2013-05-29&rft.spage=1&rft.epage=6&rft.pages=1-6&rft.issn=0738-100X&rft.isbn=1450320716&rft.isbn_list=9781450320719&rft_id=info:doi/10.1145/2463209.2488832&rft_dat=%3Cacm_6IE%3Eacm_books_10_1145_2463209_2488832%3C/acm_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=1450320716&rft.eisbn_list=9781450320719&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=6560673&rfr_iscdi=true |