Multiple pattern matching for network security applications: Acceleration through vectorization

被引:4
作者
Stylianopoulos, Charalampos [1 ]
Almgren, Magnus [1 ]
Landsiedel, Olaf [1 ,2 ]
Papatriantafilou, Marina [1 ]
机构
[1] Chalmers Univ Technol, Distributed Comp Syst Grp, Gothenburg, Sweden
[2] Univ Kiel, Comp Sci, Kiel, Germany
基金
瑞典研究理事会;
关键词
Pattern matching; SIMD; Vectorization; Gather; EFFICIENT;
D O I
10.1016/j.jpdc.2019.10.011
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
As both new network attacks emerge and network traffic increases in volume, the need to perform network traffic inspection at high rates is ever increasing. The core of many security applications that inspect network traffic (such as Network Intrusion Detection) is pattern matching. At the same time, pattern matching is a major performance bottleneck for those applications: indeed, it is shown to contribute to more than 70% of the total running time of Intrusion Detection Systems. Although numerous efficient approaches to this problem have been proposed on custom hardware, it is challenging for pattern matching algorithms to gain benefit from the advances in commodity hardware. This becomes even more relevant with the adoption of Network Function Virtualization, that moves network services, such as Network Intrusion Detection, to the cloud, where scaling on commodity hardware is key for performance. In this paper, we tackle the problem of pattern matching and show how to leverage the architecture features found in commodity platforms. We present efficient algorithmic designs that achieve good cache locality and make use of modern vectorization techniques to utilize data parallelism within each core. We first identify properties of pattern matching that make it fit for vectorization and show how to use them in the algorithmic design. Second, we build on an earlier, cache-aware algorithmic design and show how we apply cache-locality combined with SIMD gather instructions to pattern matching. Third, we complement our algorithms with an analytical model that predicts their performance and that can be used to easily evaluate alternative designs. We evaluate our algorithmic design with open data sets of real-world network traffic: Our results on two different platforms, Haswell and Xeon-Phi, show a speedup of 1.8x and 3.6x, respectively, over Direct Filter Classification (DFC), a recently proposed algorithm by Choi et al. for pattern matching exploiting cache locality, and a speedup of more than 2.3x over Aho-Corasick, a widely used algorithm in today's Intrusion Detection Systems. Finally, we utilize highly parallel hardware platforms, evaluate the scalability of our algorithms and compare it to parallel implementations of DFC and Aho-Corasick, achieving processing throughput of up to 45Gbps and close to 2 times higher throughput than Aho-Corasick. (C) 2019 Elsevier Inc. All rights reserved.
引用
收藏
页码:34 / 52
页数:19
相关论文
共 53 条
[41]  
Polychroniou O., 2014, Proceedings of the Tenth International Workshop on Data Management on New Hardware - DaMoN '14 (New York, New York, USA, 2014), P1, DOI DOI 10.1145/2619228.2619234
[42]   Rethinking SIMD Vectorization for In-Memory Databases [J].
Polychroniou, Orestis ;
Raghavan, Arun ;
Ross, Kenneth A. .
SIGMOD'15: PROCEEDINGS OF THE 2015 ACM SIGMOD INTERNATIONAL CONFERENCE ON MANAGEMENT OF DATA, 2015, :1493-1508
[43]  
Roesch M, 1999, USENIX ASSOCIATION PROCEEDINGS OF THE THIRTEENTH SYSTEMS ADMINISTRATION CONFERENCE (LISA XIII), P229
[44]   Transparent System-level Migration of PGAS Applications using Xen on InfiniBand [J].
Scarpazza, D. P. ;
Mullaney, P. ;
Villa, O. ;
Petrini, F. ;
Tipparaju, V. ;
Brown, D. M. L., Jr. ;
Nieplocha, J. .
2007 IEEE INTERNATIONAL CONFERENCE ON CLUSTER COMPUTING, 2007, :74-+
[45]   Toward developing a systematic approach to generate benchmark datasets for intrusion detection [J].
Shiravi, Ali ;
Shiravi, Hadi ;
Tavallaee, Mahbod ;
Ghorbani, Ali A. .
COMPUTERS & SECURITY, 2012, 31 (03) :357-374
[46]  
Sitaridi Evangelia, 2016, P 12 INT WORKSH DAT, DOI [10.1145/2933349.2933357, DOI 10.1145/2933349.2933357]
[47]  
Smith R, 2008, ACM SIGCOMM COMP COM, V38, P207, DOI 10.1145/1402946.1402983
[48]   Pre-decoded CAMs for efficient and high-speed NIDS pattern matching [J].
Sourdis, I ;
Pnevmatikatos, D .
12TH ANNUAL IEEE SYMPOSIUM ON FIELD-PROGRAMMABLE CUSTOM COMPUTING MACHINES, PROCEEDINGS, 2004, :258-267
[49]   CLort: High Throughput and Low Energy Network Intrusion Detection on IoT Devices with Embedded GPUs [J].
Stylianopoulos, Charalampos ;
Johansson, Linus ;
Olsson, Oskar ;
Almgren, Magnus .
SECURE IT SYSTEMS, 2018, 11252 :187-202
[50]   Multiple Pattern Matching for Network Security Applications: Acceleration through Vectorization [J].
Stylianopoulos, Charalampos ;
Almgren, Magnus ;
Landsiedel, Olaf ;
Papatriantafilou, Marina .
2017 46TH INTERNATIONAL CONFERENCE ON PARALLEL PROCESSING (ICPP), 2017, :472-482