Security and privacy have been the major concerns when people design computer networks and systems. In the recent years, there has been a significant increase in network and system attacks, such as frauds, distributed denial of service, viruses, worms, spyware, and malware, etc., causing huge economical and social damage. To deal with the rapidly evolving threats of today and the more intelligent and automatic threats in the future, we urgently need new security systems, at all times and in real-time, to protect the networks and systems, without causing performance penalty to normal operations. Multi-core processors represent a major evolution in computing hardware technology. Whereas two years ago most network processors and personal computer microprocessors had single core configuration, the majority of the current microprocessors contain dual or quad cores and the number of cores on die is expected to grow exponentially over time. Multi-core provides an application with more processing power from the hardware perspective. However, there are still significant software design challenges that must be overcome before the real-time defense system can be realized. The difficulty is not in building multi-core hardware, but in concurrently programming security systems in a way that lets them benefit from the continued growth in the CPU performance. Building such a multi-core-supported security system faces significant challenges, such as • How can we actually use multi-core to continue running security systems while keeping the overall system performance? • How can we efficiently partition and distribute the workload of security systems between the different cores in the multi-core CPU? • How can we split network data and solve the data dependency problem? • How can we smartly utilize the memory so that it brings less memory access latencies? • How can we synchronize and coordinate different threads of the security system when it is parallelized on multi-core?
[1]
Benfano Soewito,et al.
Concurrent workload mapping for multicore security systems
,
2009,
NSS 2009.
[2]
Dongqing Xie,et al.
How to construct efficient on‐line/off‐line threshold signature schemes through the simulation approach
,
2009,
Concurr. Comput. Pract. Exp..
[3]
Wanlei Zhou,et al.
I/O scheduling and performance analysis on multi‐core platforms
,
2009,
Concurr. Comput. Pract. Exp..
[4]
Florian Kerschbaum,et al.
Parallelizing secure linear programming
,
2009,
Concurr. Comput. Pract. Exp..
[5]
Minyi Guo,et al.
A scalable key pre‐distribution mechanism for large‐scale wireless sensor networks
,
2009,
Concurr. Comput. Pract. Exp..
[6]
Vern Paxson,et al.
An architecture for exploiting multi-core processors to parallelize network intrusion prevention
,
2007,
2007 IEEE Sarnoff Symposium.
[7]
Wanlei Zhou,et al.
Spam filtering for network traffic security on a multi-core environment
,
2009,
NSS 2009.
[8]
M. Carmen Fernández Gago,et al.
Concurrent access control for multi‐user and multi‐processor systems based on trust relationships
,
2009,
Concurr. Comput. Pract. Exp..