skip to main content
10.1145/2674005.2674984acmconferencesArticle/Chapter ViewAbstractPublication PagesconextConference Proceedingsconference-collections
research-article

Deep Packet Inspection as a Service

Published:02 December 2014Publication History

ABSTRACT

Middleboxes play a major role in contemporary networks, as forwarding packets is often not enough to meet operator demands, and other functionalities (such as security, QoS/QoE provisioning, and load balancing) are required. Traffic is usually routed through a sequence of such middleboxes, which either reside across the network or in a single, consolidated location. Although middleboxes provide a vast range of different capabilities, there are components that are shared among many of them.

A task common to almost all middleboxes that deal with L7 protocols is Deep Packet Inspection (DPI). Today, traffic is inspected from scratch by all the middleboxes on its route. In this paper, we propose to treat DPI as a service to the middleboxes, implying that traffic should be scanned only once, but against the data of all middleboxes that use the service. The DPI service then passes the scan results to the appropriate middleboxes. Having DPI as a service has significant advantages in performance, scalability, robustness, and as a catalyst for innovation in the middlebox domain. Moreover, technologies and solutions for current Software Defined Networks (SDN) (e.g., SIMPLE [41]) make it feasible to implement such a service and route traffic to and from its instances.

References

  1. Yehuda Afek, Anat Bremler-Barr, Yotam Harchol, David Hay, and Yaron Koral. MCA$^\mbox2$: multi-core architecture for mitigating complexity attacks. In ANCS, pages 235--246, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Alfred V. Aho and Margaret J. Corasick. Efficient string matching: An aid to bibliographic search. Commun. of the ACM, 18(6):333--340, 1975. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Alexa: The web information company, 2013. http://www.alexa.com/topsites.Google ScholarGoogle Scholar
  4. James W. Anderson, Ryan Braud, Rishi Kapoor, George Porter, and Amin Vahdat. xOMB: extensible open middleboxes with commodity servers. In ANCS, pages 49--60, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Zachary K. Baker and Viktor K. Prasanna. Time and area efficient pattern matching on FPGAs. In FPGA, pages 223--232, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Michela Becchi and Patrick Crowley. A hybrid finite automaton for practical deep packet inspection. In CoNEXT, page 1, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Michela Becchi and Patrick Crowley. An improved algorithm to accelerate regular expression evaluation. In ANCS, pages 145--154, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Blue coat packet shapper. http://www.bluecoat.com/products/packetshaper.Google ScholarGoogle Scholar
  9. Anat Bremler-Barr, Yotam Harchol, and David Hay. Space-time tradeoffs in software-based deep packet inspection. In HPSR, pages 1--8, 2011.Google ScholarGoogle ScholarCross RefCross Ref
  10. The Bro Network Security Monitor. http://bro-ids.org.Google ScholarGoogle Scholar
  11. CheckPoint. Check Point DLP software blade.\http://www.checkpoint.com/products/dlp-software-blade/.Google ScholarGoogle Scholar
  12. Clam AntiVirus. http://www.clamav.net.Google ScholarGoogle Scholar
  13. Intel Corp. Service-aware network architecture based on SDN, NFV, and network intelligence, 2014. http://www.qosmos.com/wp-content/uploads/2014/01/Intel_Qosmos_SDN_NFV_329290-002US-secured.pdf.Google ScholarGoogle Scholar
  14. Crossbeam. Virtualized security: The next generation of consolidation, 2012. http://www.computerlinks.ch/FMS/14322.virtualized_security_en_.pdf.Google ScholarGoogle Scholar
  15. Sarang Dharmapurikar, John Lockwood, and Member Ieee. Fast and scalable pattern matching for network intrusion detection systems. IEEE Journal on Selected Areas in Communications, 24:2006, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. ETSI. Network functions virtualisation - introductory white paper, 2012. http://portal.etsi.org/NFV/NFV_White_Paper.pdf.Google ScholarGoogle Scholar
  17. Seyed Kaveh Fayazbakhsh, Michael K Reiter, and Vyas Sekar. Verifiable network function outsourcing: requirements, challenges, and roadmap. In HotMiddlebox, pages 25--30, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Seyed Kaveh Fayazbakhsh, Vyas Sekar, Minlan Yu, and Jeffrey C. Mogul. FlowTags: enforcing network-wide policies in the presence of dynamic middlebox actions. In HotSDN, pages 19--24, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Domenico Ficara, Stefano Giordano, Gregorio Procissi, Fabio Vitucci, Gianni Antichi, and Andrea Di Pietro. An improved DFA for fast regular expression matching. Computer Communication Review, 38(5):29--40, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Open Networking Foundation. Openflow switch specification version 1.4.0, October 2013. https://www.opennetworking.org/images/stories/downloads/sdn-resources/onf-specifications/openflow/openflow-spec-v1.4.0.pdf.Google ScholarGoogle Scholar
  21. Jing Fu and Jennifer Rexford. Efficient IP-address lookup with a shared forwarding table for multiple virtual routers. In CoNEXT, page 21, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Aaron Gember, Anand Krishnamurthy, Saul St. John, Robert Grandl, Xiaoyang Gao, Ashok Anand, Theophilus Benson, Aditya Akella, and Vyas Sekar. Stratos: A network-aware orchestration layer for middleboxes in the cloud. CoRR, abs/1305.0209, 2013.Google ScholarGoogle Scholar
  23. Aaron Gember, Prathmesh Prabhu, Zainab Ghadiyali, and Aditya Akella. Toward software-defined middlebox networking. In HotNets, pages 7--12, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Glen Gibb, Hongyi Zeng, and Nick Mckeown. Outsourcing network functionality. In HotSDN, pages 73--78, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Lukas Kekely, Viktor Pus, and Jan Korenek. Software defined monitoring of application protocols. In INFOCOM, pages 1725--1733, 2014.Google ScholarGoogle ScholarCross RefCross Ref
  26. Junaid Khalid and Josh Slauson. Fault tolerant middleboxes. Technical report, University of Wisconsin - Madison, 2012.Google ScholarGoogle Scholar
  27. Pritesh Kothari. Network Service Header support for OVS. OVS Code Patch, September 2013. http://openvswitch.org/pipermail/dev/2013-September/032036.html.Google ScholarGoogle Scholar
  28. Sailesh Kumar, Sarang Dharmapurikar, Fang Yu, Patrick Crowley, and Jonathan Turner. Algorithms to accelerate multiple regular expressions matching for deep packet inspection. In SIGCOMM, pages 339--350, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Sailesh Kumar, Jonathan Turner, and John Williams. Advanced algorithms for fast and scalable deep packet inspection. In ANCS, pages 81--92, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Bob Lantz, Brandon Heller, and Nick McKeown. A network in a laptop: Rapid prototyping for software-defined networks. In Hotnets-IX, pages 19:1--19:6, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Hoang Le, Thilan Ganegedara, and Viktor K Prasanna. Memory-efficient and scalable virtual routers using FPGA. In FPGA, pages 257--266, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Wenke Lee, Jo\ ao B. D. Cabrera, Ashley Thomas, Niranjan Balwalli, Sunmeet Saluja, and Yi Zhang. Performance adaptation in real-time intrusion detection systems. In RAID, pages 252--273, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Chad R. Meiners, Jignesh Patel, Eric Norige, Eric Torng, and Alex X. Liu. Fast regular expression matching using small TCAMs for network intrusion detection and prevention systems. In USENIX Security, pages 8--8, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. ModSecurity. http://www.modsecurity.org.Google ScholarGoogle Scholar
  35. A10 Networks. aFleX advanced scripting for layer 4--7 traffic management. http://www.a10networks.com/products/axseries-aflex_advanced_scripting.php.Google ScholarGoogle Scholar
  36. Big Switch Networks. Big tap monitoring fabric, 2014. http://www.bigswitch.com/products/big-tap-monitoring-fabric.Google ScholarGoogle Scholar
  37. F5 Networks. Local traffic manager. https://f5.com/products/modules/local-traffic-manager.Google ScholarGoogle Scholar
  38. PCRE - Perl Compatible Regular Expressions. http://www.pcre.org/.Google ScholarGoogle Scholar
  39. Personal communication with several networking and security companies.Google ScholarGoogle Scholar
  40. Pox controller, 2013. http://www.noxrepo.org/pox/about-pox.Google ScholarGoogle Scholar
  41. Zafar Ayyub Qazi, Cheng-Chun Tu, Luis Chiang, Rui Miao, Vyas Sekar, and Minlan Yu. SIMPLE-fying middlebox policy enforcement using SDN. In SIGCOMM, pages 27--38, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. Paul Quinn, Puneet Agarwal, Rajeev Manur, Rex Fernando, Jim Guichard, Surendra Kumar, Abhishek Chauhan, Michael Smith, Navindra Yadav, and Brad McConnell. Network service header. IETF Internet-Draft, February 2014. https://datatracker.ietf.org/doc/draft-quinn-sfc-nsh.Google ScholarGoogle Scholar
  43. Shriram Rajagopalan, Dan Williams, and Hani Jamjoom. Pico replication: a high availability framework for middleboxes. In SoCC, pages 1:1--1:15, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. Shriram Rajagopalan, Dan Williams, Hani Jamjoom, and Andrew Warfield. Split/merge: System support for elastic execution in virtual middleboxes. In NSDI, pages 227--240, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. Vyas Sekar, Norbert Egi, Sylvia Ratnasamy, Michael K Reiter, and Guangyu Shi. Design and implementation of a consolidated middlebox architecture. In NSDI, pages 24--38, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. Nisarg Shah. Cisco vPath technology enabling best-in-class cloud network services, August 2013.\http://blogs.cisco.com/datacenter/cisco-vpath-technology-enabling-best-in-class-cloud-network-services/.Google ScholarGoogle Scholar
  47. Justine Sherry, Shaddi Hasan, Colin Scott, Arvind Krishnamurthy, Sylvia Ratnasamy, and Vyas Sekar. Making middleboxes someone else's problem: network processing as a cloud service. In SIGCOMM, pages 13--24, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. Snort. http://www.snort.org.Google ScholarGoogle Scholar
  49. Haoyu Song, Murali Kodialam, Fang Hao, and TV Lakshman. Building scalable virtual routers with trie braiding. In INFOCOM, pages 1--9, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  50. Sony Ericsson Latest Victim of SQL Injection Attack, 2011. http://www.eweek.com/c/a/Security/Sony-Data-Breach-Was-Camouflaged-by-Anonymous-DDoS-Attack-807651.Google ScholarGoogle Scholar
  51. Sun Wu and Udi Manber. A fast algorithm for multi-pattern searching. Technical report, Chung-Cheng University, University of Arizona, 1994.Google ScholarGoogle Scholar
  52. Fang Yu, Zhifeng Chen, Yanlei Diao, T. V. Lakshman, and Randy H. Katz. Fast and memory-efficient regular expression matching for deep packet inspection. In ANCS, pages 93--102, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Deep Packet Inspection as a Service

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        CoNEXT '14: Proceedings of the 10th ACM International on Conference on emerging Networking Experiments and Technologies
        December 2014
        438 pages
        ISBN:9781450332798
        DOI:10.1145/2674005

        Copyright © 2014 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 2 December 2014

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        CoNEXT '14 Paper Acceptance Rate27of133submissions,20%Overall Acceptance Rate198of789submissions,25%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader