Granidt: Towards Gigabit Rate Network Intrusion Detection Technology

  • Maya Gokhale
  • Dave Dubois
  • Andy Dubois
  • Mike Boorman
  • Steve Poole
  • Vic Hogsett
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2438)

Abstract

We describe a novel application of reconfigurable computing to the problem of computer network security. By filtering network packets with customized logic circuits, we can search headers as well as packet content for specific signatures at Gigabit Ethernet line rate. Input to our system is a set of filter rule descriptions in the format of the public domain “snort” databases. These descriptions are used by the hardware circuits on two Xilinx Virtex 1000 FPGAs on a SLAAC1V [9]board. Packets are read from a Gigabit Ethernet interface card, the GRIP [8], and flow directly through the packet filtering circuits. A vector describing matching packet headers and content are returned to the host program, which relates matches back to the rule database, so that logs or alerts can be generated. The hardware runs at 66 MHz with 32-bit data, giving an effective line rate of 2 Gb/s. The granidt combination software/hardware runs at 24.9X the speed of snort 1.8.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. [1]
    William Cheswick and Steven Bellovin. Firewalls and Internet Security. Addison-Wesley, 1994.Google Scholar
  2. [2]
    R. Franklin et al. Assisting network intrusion detection with reconfigurable hardware. IEEE FCCM 2002, 2002.Google Scholar
  3. [3]
    Joshua W. Haines, Richard P. Lippmann, David J. Fried, et al. 1999 darpa intrusion detection system evaluation: Design and procedures. MIT Lincoln Laboratory Technical Report, 2001.Google Scholar
  4. [4]
    Steven McCanne and Van Jacobson. The BSD packet filter: A new architecture for user-level packet capture. In USENIX Winter, pages 259–270, 1993.Google Scholar
  5. [5]
    J. McHenry et al. An fpga-based co-processor for atm firewalls. IEEE FCCM 2002, 1997.Google Scholar
  6. [6]
    IntruVert Networks. http://www.intruvert.com. 2002.
  7. [7]
    Martin Roesch. Snort: The open source network intrusion detection system. http://www.snort.org, 2002.

Copyright information

© Springer-Verlag Berlin Heidelberg 2002

Authors and Affiliations

  • Maya Gokhale
    • 1
  • Dave Dubois
    • 1
  • Andy Dubois
    • 1
  • Mike Boorman
    • 1
  • Steve Poole
    • 1
  • Vic Hogsett
    • 1
  1. 1.Los Alamos National LaboratoryLos AlamosUSA

Personalised recommendations