yyu.docx

上传人:b****6 文档编号:7260237 上传时间:2023-01-22 格式:DOCX 页数:6 大小:22.71KB
下载 相关 举报
yyu.docx_第1页
第1页 / 共6页
yyu.docx_第2页
第2页 / 共6页
yyu.docx_第3页
第3页 / 共6页
yyu.docx_第4页
第4页 / 共6页
yyu.docx_第5页
第5页 / 共6页
点击查看更多>>
下载资源
资源描述

yyu.docx

《yyu.docx》由会员分享,可在线阅读,更多相关《yyu.docx(6页珍藏版)》请在冰豆网上搜索。

yyu.docx

yyu

论文附件

Internetlinksoperateathighspeeds,andpasttrendspredictthatthesespeedswillcontinuetoincreaserapidly.RoutersandintrusiondetectiondevicesthatoperateatuptoOC-768speeds(40Gb/s)arecurrentlybeingdeveloped.Whilethemainbottlenecks(e.g.,lookups,classification,andqualityofservice)inatraditionalrouterarewellunderstood,whatarethecorrespondingfunctionsthatshouldbehardwiredinthebravenewworldofsecurityandmeasurement?

Ideally,wewishtoabstractoutfunctionsthatarecommontoseveralsecurityandmeasurementapplicationandfindefficientalgorithmsforthesefunctions,especiallyalgorithmsforthesefunctions,especiallyalgorithmswithacompacthardwareimplementation.

Towardthisgoal,thispaperisolatesandprovidessolutionsforanimportantproblemthatoccursinvariousnetworkingapplications;countingthenumberofactiveflowsamongpacketsreceivedonalinkduringaspecifiedperiodoftime.Aflowisdefinedbyasetofheaderfields;twopacketsbelongtodistinctflowiftheyhavedifferentvaluesforthespecifiedheaderfieldsthatdefinetheflow.Forexample,ifwedefineaflowbyasourceanddestinationIPaddress,wecancountthenumberofdistinctsource-destinationIPaddress,wecancountthenumberofdistinctsource-destinationIPaddresspairsseenonalinkoveragiventimeperiod.Ouralgorithmsmeasuresthenumberofactiveflowsusingaveryasmallamountofmemorythatcaneasilybestoredinon-chipSRAMorevenprocessorregisters.Bycontrast,nativealgorithmsdescribedbelowwouldrequiremassiveamountsofmemorynecessitatingtheuseofslowDRAM.

Forexample,anativemethodtocountsource-destinationpairswouldbetokeepacountertogetherwithahashtablethatstoresallthedistinct64-bitsourcedestinationaddresspairsseenthusfar.Whenapacketarriveswithsourceanddestinationaddresspairssay〈S,D〉,wesearchthehashtablefor〈S,D〉;ifthereisnohashmatch,thecounterisincrementedand〈S,D〉isaddtothehashtable.Unfortunately,giventhatbackbonelinkscanhaveuptoamillionflowstoday,thisnativeschemewouldminimallyrequire64Mbofhigh-speedmemory.SuchlargeSRAMmemoryisexpensiveornotfeasibleforamodemrouter.

Therearemoreefficientgeneral-purposealgorithmsforcountingthenumberofdistinctvaluesinamultiset.Inthispaper,wenotonlypresentageneral-purposecountingalgorithms-multiresolutionbitmap-thathasbetteraccuracythanthebestknownprioralgorithm,probabilisticcountingalgorithms,probabilisticcountingalgorithmsthatfurtherimproveperformancebytakingadvantageofparticularitiesofthespecificcountingapplication.Ouradaptivebitmap,usingthefactthatnumberofthenumberofactiveflowsdoesnotchangeveryrapidly,cancountthenumberofactiveflowsdoesnotchangeveryrapidly,cancountthenumberofactiveflowsdoesnotchangeveryrapidly,cancountthenumberofdistinctflowsonalinkthatcontainsanywherefrom0to100millionflowswithanaverageerroroflessthan1%usingonly2KBofmemory.Ourtriggeredbitmap,whichisoptimizedforrunningmultipleconcurrentinstancesofthecountingproblem,manyofwhichhavesmallcounts,issuitablefordetectingportscansandusesevenlessmemorythanrunningadaptivebitmaponeachinstance.

Aflowisdefinedbyanidentifiergivenbythevaluesofcertainheaderfiled.Theproblemwewishtosolveiscountingthenumberofdistinctflowidentifiers(flowIDs)seeninaspecifiedmeasurementinterval.Forexample,anintrusiondetectionsystemlookingforportscanscouldforeachactivesourceaddresstheflowsdefinedbydestinationIPandsuspectanysourceIPthatopensmorethanthreeflowsin12sofscanning.

Also,whilemanyapplicationdefineflowsatthegranularityofTCPconnection,onemaywanttouseotherdefinition.Forexample,whendetectingDoSattackswemaywishtocountthenumberofdistinctsource,notthenumberofTCPconnections.Thus,inthispaper,weusethetermflowinthismoregenericway.

Aswehaveseen,anativesolutionusingahashtableofflowIDsisaccuratebuttakestoomuchmemory.Inhigh-speedrouters,itisnotonlythecostoflarge,fastmemoriesthatisaproblembutalsotheirpowerconsumptionandtheboardspacetheytakeuplinecards.Thus,weseeksolutionsthatuseasmallamountofmemoryandhavehighaccuracy.Wewanttofindalgorithmswherethesetradeoffsarefavorable.Also,sinceathighspeedstheper-packetprocessingtimeislimited,itisimportantthatthealgorithmsuseonlyoneortwomemoryaccessesandaresimpleenoughtobeimplementedinhardware.

Whyisinformationaboutthenumberofflowsuseful?

Wedescribefourpossiblecategoriesofuse.

Detectingportscans:

Intrusiondetectionsystemwarnofportscanswhenasourceopenstoomanyconnectionwithinagiventime.TheywidelydeployedSnortintrusiondetectionsystem(IDS)usesthenativeapproachofstoringarecordforeachactiveconnection.Thisisanobviouswastesincemostoftheconnectionsarenotapartscan.Evenforactualportscans,iftheIDSonlyreportsthenumberofconnections,wedonotneedtokeeparecordforeachconnection.Sincethenumberofsourcescanbeveryhigh,itisdescribetofindalgorithmsthatcountthenumberofconnectionsofeachsourceusinglittlememory.Further,ifanalgorithmscandistinguishquicklybetweensuspectedportscannersandnormaltraffic,theIDSneednotperformexpensiveoperations(e,g.logging)onmostofthetraffic,thusbecomingmorescalableintermsofmemoryusageandspeed.Thisisparticularlyimportantinthecontextoftherecentracetoprovidewire-speedintrusiondetection.

Detectingdenialofservice(DoS)attracks:

FlowScanbyPlonkainapopulartoolforvisualizingnetworktraffic.Itusesthenumberofactiveflows(seeFig.1)todetectongoingdenialofserviceattacks.Whilethisworkswellattheedgeofthenetwork(i.ethelinkbetweenalargeuniversitycampusandtherestoftheInternet),itdoesnotscaletothecore.Also,itreliesonmassiveintermediatedata(NetFlow)tocomputecompactresult-couldweobtaintheusefulinformationmoredirectly?

Mahajanetal.proposeamechanismthatallowsbackbonerouterstolimittheeffectof(distributed)DoSattacks.Whilethemechanismassumethattheserouterscandetectanongoingattackitdoesnotgiveaconcretealgorithmsforit.EstanandVarghesepresentalgorithmsthatcandetectdestinationaddressorprefixesthatreceivelargeamountsoftraffic.Todifferentiatebetweenlegitimatetrafficandanattack,wecanusethefactthatDoStoolsusefakesourceaddresschosenatrandom.Ifforeachsuspectedvictimwecountthenumberofsourcesofpacketsthatcomefromsomenetworksknowntobesparelypopulated,alargecountisastrongindicationthataDoSattackisinprogress.

Generalmeasurement:

CountingthenumberofactiveconnectionsandthenumberofconnectionassociatedwitheachsourceanddestinationIPaddressisapartoftheCoralReeftrafficanalysissuite.Otherwaysofcountingdistinctvaluesingivenheaderfieldscanalsoprovideusefuldata.Onecouldmeasurethenumberofsourcesusingaprotocolversionorvarianttogetanaccurateimageofprotocoldeployment.Alternatively,bycountingthenumberofconnectionsassociatedwitheachoftheprotocolsgeneratingsignificanttraffic,wecancomputetheaverageconnectionlengthforeachprotocol,thusgettingabetterviewofitsbehavior.Dimensioningthevariouscachesinrouters(packetclassificationcaches,multicastroutecachesforsource-group(S-G)state,andARPcaches)alsobenefitsfrompriormeasurementsoftypicalworkload.

Estimatingthespreadingrateofaworm:

FromAugust1toAugust12,2001,whiletryingtotracktheCodeRedworm,collectingpacketheadersforCodeRedtrafficona/8networkproduced0.5GBperhourofcompressesdata.Todeterminetherateatwhichthewormwasspreading,itwasnecessarytocountthenumberofdistinctCodeRedsourcespassingthroughthelink.Thiswasactuallydoneusingalargelogandahashtablewhichwasexpensiveintimeandalsoinaccurate(becauseoflossesinthelog).

Thus,whilecountingthenumberofflowsisusuallyinsufficientbyitself,itcanprovideausefulbuildingblockforcomplextasks.Thispaperextendsanearlierconferenceversion.Themostimportantadditionsareadiscussionofhardwareimplementationofthebitmapandprobabilisticcounting,andadiscussionofmorerecentrelatedwork.

Thenetworkingproblemofcountingthenumberofdistinctflowshasawell-studiedequivalentinthedatabasecommunity:

countingthenumberofdistinctbaserecords(ordistinctvaluesofanattribute).Thus,themajorpieceofrelatedworkisaseminalalgorithm,probabilisticcounting,duetoFlajoletandMartin,introducedinthecontextofdatabase.Weuseprobabilisticcountingasabaseagainstwhichtocompareouralgorithms.Whangetal.addressthesameproblemandproposeanalgorithmequivalenttothesimplestalgorithmswedescribe(directbitmap)。

Theinsightbehindprobabilisticcountingistocomputeametricofhowuncommonacertainrecordisandkeeptrackofthemostuncommonrecordsseen.Ifthealgorithmsseesveryuncommonrecords,itconcludesthatthenumberofrecordsislarge.Moreprecisely,foreachrecord,thealgorithmcomputesahashfunctionthatmapsittoanLbitstring.ItthencountsthenumberofconsecutivezeroesstartingfromtheleastsignificantpositionofthehashresultandsetsthecorrespondingbitinabitmapofsizeL.Ifthealgorithmsseesrecordsthathashtovaluesendinginzero,one,andtwo0’s(thefirstthreebitsinthebitmapareset,andtherest

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > PPT模板 > 艺术创意

copyright@ 2008-2022 冰豆网网站版权所有

经营许可证编号:鄂ICP备2022015515号-1