Accelerating VNF-based Deep Packet Inspection with the use of GPUs

被引:0
|
作者
Araujo, Igor M. [1 ]
Natalino, Carlos [2 ]
Santana, Adamo L. [3 ]
Cardoso, Diego L. [1 ]
机构
[1] Fed Univ Para, Technol Inst, Belem, PA, Brazil
[2] KTH Royal Inst Technol, Opt Networks Lab ONLab, Stockholm, Sweden
[3] Fuji Elect Co Ltd, Corp R&D Headquarters, 1 Fuji Machi, Hino, Tokyo, Japan
来源
2018 20TH ANNIVERSARY INTERNATIONAL CONFERENCE ON TRANSPARENT OPTICAL NETWORKS (ICTON) | 2018年
关键词
Network Function Virtualization; Deep Packet Inspection; Graphics Processing Unit; Intrusion Detection System;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Network Function Virtualization (NFV) replaces the hardware that supports packet processing in network operation from specific-by general-purpose ones, reducing costs and bringing more flexibility and agility to the network operation. However, this shift can cause performance losses due to the non-optimal packet processing capabilities of the general-purpose hardware. Moreover, supporting the line rate of optical network channels with Virtualized Network Functions (VNFs) is a challenging task. This work analyzes the benefits of using Graphics Processing Units (GPUs) to support the execution of a Deep Packet Inspection (DPI) VNF towards supporting the line rate of an optical channel. The use of GPUs in VNFs has a great potential to increase throughput, but the delay incurred might be an issue for some functions. Our simulation was performed using an Intrusion Detection Systems (IDS) which performs DPI deployed as a VNF under real-world traffic scaled to high bit rates. Results show that the packet processing speedup achieved by using GPUs can reach up to 19 times, at the expense of a higher packet delay.
引用
收藏
页数:4
相关论文
共 50 条
  • [21] The Tale of Deep Packet Inspection in China: Mind the Gap
    Yang, Feng
    2015 3rd International Conference on Information and Communication Technology (ICoICT), 2015, : 348 - 351
  • [22] Improved deep packet inspection in data stream detection
    Chunyong Yin
    Hongyi Wang
    Xiang Yin
    Ruxia Sun
    Jin Wang
    The Journal of Supercomputing, 2019, 75 : 4295 - 4308
  • [23] Fast Deep Packet Inspection with a Dual Finite Automata
    Liu, Cong
    Wu, Jie
    IEEE TRANSACTIONS ON COMPUTERS, 2013, 62 (02) : 310 - 321
  • [24] DSM: Delayed Signature Matching in Deep Packet Inspection
    Zeng, Yingpei
    Guo, Shanqing
    Wu, Ting
    Zheng, Qiuhua
    SYMMETRY-BASEL, 2020, 12 (12): : 1 - 22
  • [25] P2DPI: Practical and Privacy-Preserving Deep Packet Inspection
    Kim, Jongkil
    Camtepe, Seyit
    Baek, Joonsang
    Susilo, Willy
    Pieprzyk, Josef
    Nepal, Surya
    ASIA CCS'21: PROCEEDINGS OF THE 2021 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2021, : 135 - 146
  • [26] Hardware acceleration of regular expression repetitions in deep packet inspection
    Cronin, Brendan
    Wang, Xiaojun
    IET INFORMATION SECURITY, 2013, 7 (04) : 327 - 335
  • [27] Unsupervised Clustering of Honeypot Attacks by Deep HTTP Packet Inspection
    Aurora, Victor
    Neal, Christopher
    Proulx, Alexandre
    Cuppens, Nora Boulahia
    Cuppens, Frederic
    FOUNDATIONS AND PRACTICE OF SECURITY, PT I, FPS 2023, 2024, 14551 : 53 - 68
  • [28] Practical privacy-preserving deep packet inspection outsourcing
    Li, Jie
    Su, Jinshu
    Chen, Rongmao
    Wang, Xiaofeng
    Chen, Shuhui
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2019, 31 (22):
  • [29] Deep Packet Inspection in Residential Gateways and Routers: Issues and Challenges
    Shankar, Subramanian Shiva
    Lin PinXing
    Herkersdorf, Andreas
    2014 14TH INTERNATIONAL SYMPOSIUM ON INTEGRATED CIRCUITS (ISIC), 2014, : 560 - 563
  • [30] Boundary hash for memory-efficient Deep Packet Inspection
    Artan, N. Sertac
    Bando, Masanori
    Chao, H. Jonathan
    2008 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, PROCEEDINGS, VOLS 1-13, 2008, : 1732 - 1737