High-performance hardware monitors to protect network processors from data plane attacks

The Internet represents an essential communication infrastructure that needs to be protected from malicious attacks. Modern network routers are typically implemented using embedded multi-core network processors that are inherently vulnerable to attack. Hardware monitor subsystems, which can verify the behavior of a router's packet processing system at runtime, can be used to identify and respond to an ever-changing range of attacks. While hardware monitors have primarily been described in the context of general-purpose computing, our work focuses on two important aspects that are relevant to the embedded networking domain: We present the design and prototype implementation of a high-performance monitor that can track each processor instruction with low memory overhead. Additionally, our monitor is capable of defending against attacks on processors with a Harvard architecture, the dominant contemporary network processor organization. We demonstrate that our monitor architecture provides no network slowdown in the absence of an attack and provides the capability to drop attack packets without otherwise affecting regular network traffic when an attack occurs.

[1]  David Moore,et al.  Code-Red: a case study on the spread and victims of an internet worm , 2002, IMW '02.

[2]  Mihai Budiu,et al.  Control-flow integrity principles, implementations, and applications , 2009, TSEC.

[3]  Martín Abadi,et al.  Control-flow integrity , 2005, CCS '05.

[4]  Tilman Wolf,et al.  Reconfigurable Hardware for High-Security/ High-Performance Embedded Systems: The SAFES Perspective , 2008, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.

[5]  Salvatore J. Stolfo,et al.  Brave New World: Pervasive Insecurity of Embedded Network Devices , 2009, RAID.

[6]  MemonNasir,et al.  SAFE-OPS: An approach to embedded software security , 2005 .

[7]  Lizy Kurian John,et al.  NpBench: a benchmark suite for control plane and data plane applications for network processors , 2003, Proceedings 21st International Conference on Computer Design.

[8]  David Geer,et al.  Malicious bots threaten network security , 2005, Computer.

[9]  Srivaths Ravi,et al.  Secure embedded processing through hardware-assisted run-time monitoring , 2005, Design, Automation and Test in Europe.

[10]  Shufu Mao,et al.  Hardware Support for Secure Processing in Embedded Systems , 2007, 2007 44th ACM/IEEE Design Automation Conference.

[11]  Claude Castelluccia,et al.  Code injection attacks on harvard-architecture devices , 2008, CCS.

[12]  Nasir D. Memon,et al.  SAFE-OPS: An approach to embedded software security , 2005, TECS.

[13]  Scott Shenker,et al.  Overcoming the Internet impasse through virtualization , 2005, Computer.

[14]  Tilman Wolf,et al.  Attacks and Defenses in the Data Plane of Networks , 2012, IEEE Transactions on Dependable and Secure Computing.

[15]  Sri Parameswaran,et al.  IMPRES: integrated monitoring for processor reliability and security , 2006, 2006 43rd ACM/IEEE Design Automation Conference.

[16]  Jeffrey D. Ullman,et al.  Introduction to Automata Theory, Languages and Computation , 1979 .