Hardware-Based "on-the-fly" Per-flow Scan Detector Pre-filter (Poster)

Pre-filtering monitoring tasks, directly running over traffic probes, may accomplish a significant degree of data reduction by isolating a relatively small number of flows (likely to be of interest for the monitoring application) from the rest of the traffic. As these filtering mechanisms are conveniently run as close as possible to the data gathering devices (traffic probes), and must scale to multi-gigabit speed, the feasibility of their implementation in hardware is a key requirement. In this paper, we document a hardware FPGA implementation of a recently proposed network scan pre-filter. It leverages processing stages based on Bloom filters and Counting Bloom Filters, and it is devised to detect, through on-the-fly per-packet analysis, the flows which potentially exhibit a network/port scanning behaviour. The framework has been implemented in a modular manner. It suitably combines two different general-purpose modules (a rate meter and a variation detector) likely to be reused as building blocks for other monitoring tasks. In the following presentation, we further discuss some lessons learned and general implementation guidelines which emerge when the goal is to efficiently implement run-time updated (i.e., dynamic) Bloom-filter-based data structures in hardware

[1]  Brian Trammell,et al.  Measurement Data Reduction through Variation Rate Metering , 2010, 2010 Proceedings IEEE INFOCOM.

[2]  Haoyu Song,et al.  Fast packet classification using bloom filters , 2006, 2006 Symposium on Architecture For Networking And Communications Systems.

[3]  George Varghese,et al.  Automated Worm Fingerprinting , 2004, OSDI.

[4]  Andrei Broder,et al.  Network Applications of Bloom Filters: A Survey , 2004, Internet Math..

[5]  Xing Li,et al.  A Double-Filter Structure Based Scheme for Scalable Port Scan Detection , 2006 .

[6]  George Varghese,et al.  New directions in traffic measurement and accounting , 2002, CCRV.