LEoNIDS: a Low-latency and Energyefficient Intrusion Detection System
|
|
- Angela Roberts
- 6 years ago
- Views:
Transcription
1 LEoNIDS: a Low-latency and Energyefficient Intrusion Detection System Nikos Tsikoudis Thesis Supervisor: Evangelos Markatos June 2013 Heraklion, Greece
2 Low-Power Design Low-power systems receive significant attention Energy efficiency in Datacenters Battery-operated devices Computer networks 2
3 Network Intrusion Detection Systems (NIDS) Detect security violations Secure operation of computer networks NIDS utilize multi-core systems or cluster of servers Increased network traffic volumes Heavy computationally operations 3
4 Energy versus Performance Low-power techniques lead to performance degradation Dynamic Voltage and Frequency Scaling (DVFS) NIDS performance factor Detection latency Energy-latency tradeoff 4
5 Motivation NIDS is not often overloaded Why power consumption matters Significant concern in data centers Limited power capacity NIDS on battery-operated devices Why detection latency matters Fast active reaction and protection 5
6 Our Proposed Approach Identify the most important packets for attack detection Process most important packets with lower latency Priority queue scheduling Dedicated cores for these packets 6
7 Environment (1/2) 2 x Intel Xeon E Six core processors Intel 82599EB 10GbE NIC RSS feature: splits the traffic across cores Every core is assigned with a queue for packet queuing 7
8 Environment (2/2) Watts up? PRO ES Snort IDS One detection process on each core Anonymized real traffic 40GB trace, 59M packets, 1.5M flows 1938 alerts, 90 attack signatures 8
9 Towards a Power Proportional NIDS 9
10 Power consumption CPU consumes the larger portion of the energy CPU-based low-power techniques Dynamic Voltage and Frequency Scaling (DVFS) Core sleep states (C-states) 10
11 Exploring the design space Operate at lower frequency with no idle time or utilize sleep states? More cores on lower frequency or less cores at higher frequency? 11
12 Exploring the design space 0.6 Gbit/sec 12
13 Lower frequency or utilize sleep states? Lowest power consumption 13
14 Impact of core utilization Power consumption decreases as the core utilization increases 14
15 Lower frequency or utilize sleep states? Operate at the lowest possible frequency with no idle time 15
16 More cores on lower frequency or less cores at higher frequency? 1.5GBit/sec 16
17 More cores on lower frequency or less cores at higher frequency? More cores on lower frequency 1.5GBit/sec 17
18 A straight-forward power-proportional NIDS Utilize the smallest number of cores able to sustain the traffic at the lowest possible frequency monitors the queues' utilization adapts the number of cores and the frequency based on thresholds 18
19 Adapt to the traffic load 19
20 Adapt to the traffic load 23% 20
21 NIDS Performance 21
22 Detection latency Alert trigger timestamp packet capture timestamp Queuing delay Processing time A high detection latency makes the NIDS reaction pointless 22
23 Detection latency 0.6 Gbit/sec Exponential increase when core utilization exceeds 70% 23
24 Energy Latency tradeoff Up to 7x increase for power lower than 100W 0.6 Gbit/sec 24
25 Deconstructing Detection Latency 25
26 Deconstructing Detection Latency Queuing delay is the main factor of the increased detection latency 26
27 Detection latency of power-proportional system Power proportional system has close to 100% utilization at every core 27
28 Solving the Energy-Latency Tradeoff 28
29 Key Idea Identifying the most important packets Ensure low latency for them Small percentage of packets with higher probability to contain an attack First few packets of each connection Brute force attacks, port scanning, code-injection attacks 29
30 Identifying the Most Important Packets 30
31 Identifying the Most Important Packets 50% attacks within the first 10 packets of each flow 31
32 Identifying the Most Important Packets 90% attacks within the first 100 packets of each flow 32
33 Identifying the Most Important Packets 1% beyond the first 800 packets of a flow 33
34 Identifying the Most Important Packets 34
35 Identifying the Most Important Packets 10% of the total packets contain 90% of the total attacks 35
36 Resolving Energy-Latency Tradeoff We propose two alternative techniques Time sharing Priority queue scheduling Space sharing Dedicated cores with lower utilization 36
37 Implementation Techniques are implemented within the capturing subsystem as kernel module 37
38 Time Sharing Classifies packet into transport-layer flows Assign low and high priority according to a flow cutoff value Uses the strategy described for powerproportional system 38
39 Space Sharing Separate cores for each priority based on a flow cutoff value Flow migration Adaptive core management Keep high-priority cores less utilized 39
40 Adapting the Number of Active Cores 40
41 Experimental Evaluation Evaluate the alternative approaches to find out and optimal cutoff Low cutoff values result in more attacks in lowpriority packets High cutoff values result in increased fraction of high-priority packets with more benign packets Compare all approaches 41
42 Time Sharing 42
43 Time Sharing 1.0 Gbit/sec 43
44 Time Sharing 1.0 Gbit/sec 49x 44
45 Time Sharing 1.0 Gbit/sec 45
46 Time Sharing 1.0 Gbit/sec 46
47 Space Sharing 1.0 Gbit/sec 47
48 Space Sharing 48
49 Space Sharing Performs Better Low- and highpriority packets are processed in parallel Space Sharing We keep highpriority cores less utilized Time Sharing 49
50 Comparison of all Approaches 50
51 Comparison of all Approaches More than 40% 51
52 Comparison of all Approaches 22% 52
53 Conclusions Energy-efficiency in NIDS Energy-latency tradeoff Identify most important packet LEoNIDS: Low-latency, Energy-Efficient NIDS Space sharing 53
54 Thank you 54
55 Back up slides 55
56 More cores on lower frequency or less cores at higher frequency? 56
57 More cores on lower frequency or less cores at higher frequency? 6 cores, 1.2 GHz, 95.9W 4 cores, 1.8 GHz, 98.5W 57
58 Adapt to the traffic load 24% 58
59 Adapt to the traffic load 24% 39% 59
60 Time Sharing 60
61 Space Sharing 61
62 Space Sharing Performs Better 62
LEoNIDS: A Low-Latency and Energy-Efficient Network-Level Intrusion Detection System
Received 2 September 2014; revised 7 November 2014; accepted 8 November 2014. Date of publication 4 December 2014; date of current version 26 February 2016. Digital Object Identifier 10.1109/TETC.2014.2369958
More informationLEoNIDS: a Low-latency and Energy-efficient Network-level Intrusion Detection System. Nikos Tsikoudis. Master s thesis
University of Crete School of Sciences and Engineering Computer Science Department LEoNIDS: a Low-latency and Energy-efficient Network-level Intrusion Detection System Nikos Tsikoudis Master s thesis June
More informationSupra-linear Packet Processing Performance with Intel Multi-core Processors
White Paper Dual-Core Intel Xeon Processor LV 2.0 GHz Communications and Networking Applications Supra-linear Packet Processing Performance with Intel Multi-core Processors 1 Executive Summary Advances
More informationEnergy-centric DVFS Controlling Method for Multi-core Platforms
Energy-centric DVFS Controlling Method for Multi-core Platforms Shin-gyu Kim, Chanho Choi, Hyeonsang Eom, Heon Y. Yeom Seoul National University, Korea MuCoCoS 2012 Salt Lake City, Utah Abstract Goal To
More information소프트웨어기반고성능침입탐지시스템설계및구현
소프트웨어기반고성능침입탐지시스템설계및구현 KyoungSoo Park Department of Electrical Engineering, KAIST M. Asim Jamshed *, Jihyung Lee*, Sangwoo Moon*, Insu Yun *, Deokjin Kim, Sungryoul Lee, Yung Yi* Department of Electrical
More informationMiAMI: Multi-Core Aware Processor Affinity for TCP/IP over Multiple Network Interfaces
MiAMI: Multi-Core Aware Processor Affinity for TCP/IP over Multiple Network Interfaces Hye-Churn Jang Hyun-Wook (Jin) Jin Department of Computer Science and Engineering Konkuk University Seoul, Korea {comfact,
More informationThe Power of Batching in the Click Modular Router
The Power of Batching in the Click Modular Router Joongi Kim, Seonggu Huh, Keon Jang, * KyoungSoo Park, Sue Moon Computer Science Dept., KAIST Microsoft Research Cambridge, UK * Electrical Engineering
More informationNetwork Security Platform 8.1
8.1.7.82-8.1.3.100 Manager-M-series Release Notes Network Security Platform 8.1 Revision B Contents About this release New features Enhancements Resolved issues Installation instructions Known issues Product
More informationMcAfee Network Security Platform 9.1
9.1.7.15-9.1.5.9 Manager-NS-series Release Notes McAfee Network Security Platform 9.1 Revision A Contents About this release New features Enhancements Resolved issues Installation instructions Known issues
More informationMcAfee Network Security Platform 8.3
8.3.7.86-8.3.7.56 Manager-Virtual IPS Release Notes McAfee Network Security Platform 8.3 Revision C Contents About this release New features Enhancements Resolved issues Installation instructions Known
More informationTool Manual (Version I)
EMIST Network Intrusion Detection (NID) Tool Manual (Version I) J. Wang, D.J. Miller and G. Kesidis CSE & EE Depts, Penn State Copyright (c) 2006 The Pennsylvania State University i TABLE OF CONTENTS 1.
More informationArchitecture and Performance Implications
VMWARE WHITE PAPER VMware ESX Server 2 Architecture and Performance Implications ESX Server 2 is scalable, high-performance virtualization software that allows consolidation of multiple applications in
More informationPower-Aware Scheduling of Virtual Machines in DVFS-enabled Clusters
Power-Aware Scheduling of Virtual Machines in DVFS-enabled Clusters Gregor von Laszewski, Lizhe Wang, Andrew J. Younge, Xi He Service Oriented Cyberinfrastructure Lab Rochester Institute of Technology,
More informationA Study on Optimally Co-scheduling Jobs of Different Lengths on CMP
A Study on Optimally Co-scheduling Jobs of Different Lengths on CMP Kai Tian Kai Tian, Yunlian Jiang and Xipeng Shen Computer Science Department, College of William and Mary, Virginia, USA 5/18/2009 Cache
More informationChapter 8. Virtual Memory
Operating System Chapter 8. Virtual Memory Lynn Choi School of Electrical Engineering Motivated by Memory Hierarchy Principles of Locality Speed vs. size vs. cost tradeoff Locality principle Spatial Locality:
More informationNetwork Design Considerations for Grid Computing
Network Design Considerations for Grid Computing Engineering Systems How Bandwidth, Latency, and Packet Size Impact Grid Job Performance by Erik Burrows, Engineering Systems Analyst, Principal, Broadcom
More informationSpeeding up Linux TCP/IP with a Fast Packet I/O Framework
Speeding up Linux TCP/IP with a Fast Packet I/O Framework Michio Honda Advanced Technology Group, NetApp michio@netapp.com With acknowledge to Kenichi Yasukata, Douglas Santry and Lars Eggert 1 Motivation
More informationEnergy efficient mapping of virtual machines
GreenDays@Lille Energy efficient mapping of virtual machines Violaine Villebonnet Thursday 28th November 2013 Supervisor : Georges DA COSTA 2 Current approaches for energy savings in cloud Several actions
More informationVery Fast Containment of Scanning Worms. Nicholas Weaver, Stuart Staniford, Vern Paxson ICSI, Nevis Networks, ICSI & LBNL
Very Fast Containment of Scanning Worms Nicholas Weaver, Stuart Staniford, Vern Paxson ICSI, Nevis Networks, ICSI & LBNL 1 Outline Worm Containment Scan Suppression Hardware Implementation Cooperation
More informationPOWER MANAGEMENT AND ENERGY EFFICIENCY
POWER MANAGEMENT AND ENERGY EFFICIENCY * Adopted Power Management for Embedded Systems, Minsoo Ryu 2017 Operating Systems Design Euiseong Seo (euiseong@skku.edu) Need for Power Management Power consumption
More informationMcAfee Network Security Platform 8.3
Revision A McAfee Network Security Platform 8.3 (8.3.7.86-8.3.5.53 Manager-NS-series Release Notes) Contents About this release New features Enhancements Resolved issues Installation instructions Known
More informationMcAfee Network Security Platform 8.3
8.3.7.28-8.3.7.6 Manager-Virtual IPS Release Notes McAfee Network Security Platform 8.3 Revision B Contents About this release New features Enhancements Resolved issues Installation instructions Known
More informationManaging Performance Variance of Applications Using Storage I/O Control
Performance Study Managing Performance Variance of Applications Using Storage I/O Control VMware vsphere 4.1 Application performance can be impacted when servers contend for I/O resources in a shared storage
More informationOpen Source Traffic Analyzer
Open Source Traffic Analyzer Daniel Turull June 2010 Outline 1 Introduction 2 Background study 3 Design 4 Implementation 5 Evaluation 6 Conclusions 7 Demo Outline 1 Introduction 2 Background study 3 Design
More informationMcAfee Network Security Platform 9.1
9.1.7.15-9.1.3.4 Manager-M-series, Mxx30-series, XC Cluster Release Notes McAfee Network Security Platform 9.1 Revision A Contents About this release New features Enhancements Resolved issues Installation
More informationAn Empirical Model for Predicting Cross-Core Performance Interference on Multicore Processors
An Empirical Model for Predicting Cross-Core Performance Interference on Multicore Processors Jiacheng Zhao Institute of Computing Technology, CAS In Conjunction with Prof. Jingling Xue, UNSW, Australia
More informationCHAPTER 6 STATISTICAL MODELING OF REAL WORLD CLOUD ENVIRONMENT FOR RELIABILITY AND ITS EFFECT ON ENERGY AND PERFORMANCE
143 CHAPTER 6 STATISTICAL MODELING OF REAL WORLD CLOUD ENVIRONMENT FOR RELIABILITY AND ITS EFFECT ON ENERGY AND PERFORMANCE 6.1 INTRODUCTION This chapter mainly focuses on how to handle the inherent unreliability
More information10 MONITORING AND OPTIMIZING
MONITORING AND OPTIMIZING.1 Introduction Objectives.2 Windows XP Task Manager.2.1 Monitor Running Programs.2.2 Monitor Processes.2.3 Monitor System Performance.2.4 Monitor Networking.2.5 Monitor Users.3
More informationTask Scheduling of Real- Time Media Processing with Hardware-Assisted Virtualization Heikki Holopainen
Task Scheduling of Real- Time Media Processing with Hardware-Assisted Virtualization Heikki Holopainen Aalto University School of Electrical Engineering Degree Programme in Communications Engineering Supervisor:
More informationSNMP MIBs and Traps Supported
This section describes the MIBs available on your system. When you access your MIB data you will expose additional MIBs not listed in this section. The additional MIBs you expose through the process are
More informationVirtualizing Agilent OpenLAB CDS EZChrom Edition with VMware
Virtualizing Agilent OpenLAB CDS EZChrom Edition with VMware Technical Overview Abstract This technical overview describes the considerations, recommended configurations, and host server requirements when
More informationWhat s New in VMware vsphere 4.1 Performance. VMware vsphere 4.1
What s New in VMware vsphere 4.1 Performance VMware vsphere 4.1 T E C H N I C A L W H I T E P A P E R Table of Contents Scalability enhancements....................................................................
More informationNetwork Security Platform 8.1
8.1.7.82-8.1.5.175-8.1.3.100 Manager-XC-Cluster Release Notes Network Security Platform 8.1 Revision A Contents About this release New features Enhancements Resolved issues Installation instructions Known
More informationSupporting Fine-Grained Network Functions through Intel DPDK
Supporting Fine-Grained Network Functions through Intel DPDK Ivano Cerrato, Mauro Annarumma, Fulvio Risso - Politecnico di Torino, Italy EWSDN 2014, September 1st 2014 This project is co-funded by the
More informationNetwork Security Platform 8.1
8.1.7.100-8.1.3.130 Manager-M-series Release Notes Network Security Platform 8.1 Revision A Contents About this release New features Enhancements Resolved issues Installation instructions Known issues
More informationLearning with Purpose
Network Measurement for 100Gbps Links Using Multicore Processors Xiaoban Wu, Dr. Peilong Li, Dr. Yongyi Ran, Prof. Yan Luo Department of Electrical and Computer Engineering University of Massachusetts
More informationFast packet processing in the cloud. Dániel Géhberger Ericsson Research
Fast packet processing in the cloud Dániel Géhberger Ericsson Research Outline Motivation Service chains Hardware related topics, acceleration Virtualization basics Software performance and acceleration
More informationTales of the Tail Hardware, OS, and Application-level Sources of Tail Latency
Tales of the Tail Hardware, OS, and Application-level Sources of Tail Latency Jialin Li, Naveen Kr. Sharma, Dan R. K. Ports and Steven D. Gribble February 2, 2015 1 Introduction What is Tail Latency? What
More informationEtiquette protocol for Ultra Low Power Operation in Sensor Networks
Etiquette protocol for Ultra Low Power Operation in Sensor Networks Samir Goel and Tomasz Imielinski {gsamir, imielins}@cs.rutgers.edu DataMan Lab, Department of Computer Science Acknowledgement: Prof.
More informationCongestion Control in Datacenters. Ahmed Saeed
Congestion Control in Datacenters Ahmed Saeed What is a Datacenter? Tens of thousands of machines in the same building (or adjacent buildings) Hundreds of switches connecting all machines What is a Datacenter?
More informationNetwork Security Platform 8.1
8.1.19.23-8.1.15.14 Manager-M-series FIPS Release Notes Network Security Platform 8.1 Revision A Contents About this release New features Enhancements Resolved issues Known issues Installation instructions
More informationBSDCan 2015 June 13 th Extensions to FreeBSD Datacenter TCP for Incremental Deployment Support. Midori Kato
BSDCan 2015 June 13 th Extensions to FreeBSD Datacenter TCP for Incremental Deployment Support Midori Kato DCTCP has been available since FreeBSD 11.0!! 2 FreeBSD DCTCP highlight
More informationImproving the Database Logging Performance of the Snort Network Intrusion Detection Sensor
-0- Improving the Database Logging Performance of the Snort Network Intrusion Detection Sensor Lambert Schaelicke, Matthew R. Geiger, Curt J. Freeland Department of Computer Science and Engineering University
More informationAnatomy of a Real-Time Intrusion Prevention System
Anatomy of a Real-Time Intrusion Prevention System Koller, R.; Rangaswami, R.; Marrero, J.; Hernandez, I.; Smith, G.; Barsilai, M.; Necula, S.; Sadjadi, S.M.; Tao Li; Merrill, K., Autonomic Computing,
More informationNetwork Security Platform 8.1
8.1.3.6-8.1.3.5 M-series Release Notes Network Security Platform 8.1 Revision A Contents About this release New features Enhancements Resolved issues Installation instructions Known issues Product documentation
More informationMcAfee Network Security Platform 8.3
8.3.7.68-8.3.7.55-8.3.7.14 Manager-Virtual IPS Release Notes McAfee Network Security Platform 8.3 Revision A Contents About this release New features Enhancements Resolved issues Installation instructions
More informationIntrusion Detection System
Intrusion Detection System Time Machine Dynamic Application Detection 1 NIDS: Two generic problems Attack identified But what happened in the past??? Application identification Only by port number! Yet
More informationPreserving I/O Prioritization in Virtualized OSes
Preserving I/O Prioritization in Virtualized OSes Kun Suo 1, Yong Zhao 1, Jia Rao 1, Luwei Cheng 2, Xiaobo Zhou 3, Francis C. M. Lau 4 The University of Texas at Arlington 1, Facebook 2, University of
More informationEXAM Pro: Windows Server 2008 R2, Virtualization Administrator. Buy Full Product.
Microsoft EXAM - 70-693 Pro: Windows Server 2008 R2, Virtualization Administrator Buy Full Product http://www.examskey.com/70-693.html Examskey Microsoft 70-693 exam demo product is here for you to test
More informationWide area networks: packet switching and congestion
Wide area networks: packet switching and congestion Packet switching ATM and Frame Relay Congestion Circuit and Packet Switching Circuit switching designed for voice Resources dedicated to a particular
More informationPerformance Evaluation of Scheduling Mechanisms for Broadband Networks
Performance Evaluation of Scheduling Mechanisms for Broadband Networks Gayathri Chandrasekaran Master s Thesis Defense The University of Kansas 07.31.2003 Committee: Dr. David W. Petr (Chair) Dr. Joseph
More informationPower Control in Virtualized Data Centers
Power Control in Virtualized Data Centers Jie Liu Microsoft Research liuj@microsoft.com Joint work with Aman Kansal and Suman Nath (MSR) Interns: Arka Bhattacharya, Harold Lim, Sriram Govindan, Alan Raytman
More informationNetwork Security Platform 8.1
8.1.7.91-8.1.3.124-2.11.9 Manager-XC-Cluster Release Notes Network Security Platform 8.1 Revision B Contents About this release New features Enhancements Resolved issues Installation instructions Known
More informationDemartek September Intel 10GbE Adapter Performance Evaluation for FCoE and iscsi. Introduction. Evaluation Environment. Evaluation Summary
Intel 10GbE Adapter Performance Evaluation for FCoE and iscsi Evaluation report prepared under contract with Intel Corporation Introduction As the interest in converged networks grows, and as the vendors
More informationMcAfee Network Security Platform 8.3
Revision A McAfee Network Security Platform 8.3 (8.3.7.86-8.3.7.59 Manager-Virtual IPS Release Notes) Contents About this release New features Enhancements Resolves issues Installation instructions Known
More informationTowards Energy Proportionality for Large-Scale Latency-Critical Workloads
Towards Energy Proportionality for Large-Scale Latency-Critical Workloads David Lo *, Liqun Cheng *, Rama Govindaraju *, Luiz André Barroso *, Christos Kozyrakis Stanford University * Google Inc. 2012
More informationA Cool Scheduler for Multi-Core Systems Exploiting Program Phases
IEEE TRANSACTIONS ON COMPUTERS, VOL. 63, NO. 5, MAY 2014 1061 A Cool Scheduler for Multi-Core Systems Exploiting Program Phases Zhiming Zhang and J. Morris Chang, Senior Member, IEEE Abstract Rapid growth
More informationA Userspace Packet Switch for Virtual Machines
SHRINKING THE HYPERVISOR ONE SUBSYSTEM AT A TIME A Userspace Packet Switch for Virtual Machines Julian Stecklina OS Group, TU Dresden jsteckli@os.inf.tu-dresden.de VEE 2014, Salt Lake City 1 Motivation
More informationUsing Network Traffic to Remotely Identify the Type of Applications Executing on Mobile Devices. Lanier Watkins, PhD
Using Network Traffic to Remotely Identify the Type of Applications Executing on Mobile Devices Lanier Watkins, PhD LanierWatkins@gmail.com Outline Introduction Contributions and Assumptions Related Work
More informationMcAfee Network Security Platform 8.3
8.3.7.52-8.3.3.27-2.11.9 Manager-XC-Cluster Release Notes McAfee Network Security Platform 8.3 Revision C Contents About this release New features Enhancements Resolved issues Installation instructions
More informationRIGHTNOW A C E
RIGHTNOW A C E 2 0 1 4 2014 Aras 1 A C E 2 0 1 4 Scalability Test Projects Understanding the results 2014 Aras Overview Original Use Case Scalability vs Performance Scale to? Scaling the Database Server
More informationTN1070: Verint Master Server Under
Technical Note TN1070: Verint Master Server Under VMware 6.0 Publication Date: Monday, May 23, 2016 Products Exposure Level Technical Note Type Description Verint VMS 6.4 SP3 and higher VMware 6.0 Customer
More informationAdobe Acrobat Connect Pro 7.5 and VMware ESX Server
White Paper Table of contents 2 Tested environments 3 Benchmarking tests 3 Performance comparisons 7 Installation requirements 7 Installing and configuring the VMware environment 1 Supported virtual machine
More informationIntrusion Prevention Performance Tuning
The following topics describe how to refine intrusion prevention performance: About, page 1 Limiting Pattern Matching for Intrusions, page 2 Regular Expression Limits Overrides for Intrusion Rules, page
More informationMcAfee Network Security Platform 8.1
Revision C McAfee Network Security Platform 8.1 (8.1.7.91-8.1.3.124 Manager-M-series Release Notes) Contents About this release New features Enhancements Resolved issues Installation instructions Known
More informationESA System Health Parameters and System Health Check
ESA System Health Parameters and System Health Check Contents Introduction Prerequisites Requirements Components Used System Health Parameters System Health Check Analyze Potential Upgrade Issues Data
More informationPower Management for Embedded Systems
Power Management for Embedded Systems Minsoo Ryu Hanyang University Why Power Management? Battery-operated devices Smartphones, digital cameras, and laptops use batteries Power savings and battery run
More informationDiffusing Your Mobile Apps: Extending In-Network Function Virtualisation to Mobile Function Offloading
Diffusing Your Mobile Apps: Extending In-Network Function Virtualisation to Mobile Function Offloading Mario Almeida, Liang Wang*, Jeremy Blackburn, Konstantina Papagiannaki, Jon Crowcroft* Telefonica
More informationCisco Nexus 7000 Switches Second-Generation Supervisor Modules Data Sheet
Data Sheet Cisco Nexus 7000 Switches Second-Generation Supervisor Modules Data Sheet Product Overview The second-generation Cisco Nexus 7000 Supervisor Modules scale the control-plane and data-plane services
More informationNetwork Security Platform 8.1
8.1.7.96-8.1.3.130 Manager-M-series Release Notes Network Security Platform 8.1 Revision A Contents About this release New features Enhancements Resolved issues Installation instructions Known issues Product
More informationAccelerating String Matching Algorithms on Multicore Processors Cheng-Hung Lin
Accelerating String Matching Algorithms on Multicore Processors Cheng-Hung Lin Department of Electrical Engineering, National Taiwan Normal University, Taipei, Taiwan Abstract String matching is the most
More informationPerformance Considerations of Network Functions Virtualization using Containers
Performance Considerations of Network Functions Virtualization using Containers Jason Anderson, et al. (Clemson University) 2016 International Conference on Computing, Networking and Communications, Internet
More informationCisco Nexus 9500 Series Switches Buffer and Queuing Architecture
White Paper Cisco Nexus 9500 Series Switches Buffer and Queuing Architecture White Paper December 2014 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.
More informationTwo-Choice Randomized Dynamic I/O Scheduler for Object Storage Systems. Dong Dai, Yong Chen, Dries Kimpe, and Robert Ross
Two-Choice Randomized Dynamic I/O Scheduler for Object Storage Systems Dong Dai, Yong Chen, Dries Kimpe, and Robert Ross Parallel Object Storage Many HPC systems utilize object storage: PVFS, Lustre, PanFS,
More informationIDS: Signature Detection
IDS: Signature Detection Idea: What is bad, is known What is not bad, is good Determines whether a sequence of instructions being executed is known to violate the site security policy Signatures: Descriptions
More informationBlazer Pro V2.1 Client Requirements & Hardware Performance
Blazer Pro V2.1 Client Requirements & Hardware Performance Table of Contents Chapter 1 Client Requirements... 2 Chapter 2 Control Client Performance... 3 2.1 Local Control Client on Blazer Pro Server...
More informationCOL862 Programming Assignment-1
Submitted By: Rajesh Kedia (214CSZ8383) COL862 Programming Assignment-1 Objective: Understand the power and energy behavior of various benchmarks on different types of x86 based systems. We explore a laptop,
More informationMcAfee Network Security Platform 8.3
Revision A McAfee Network Security Platform 8.3 (8.3.7.86-8.3.3.39 Manager-M-series Release Notes) Contents About this release New features Enhancements Resolved issues Installation instructions Known
More informationMcAfee Network Security Platform 9.2
McAfee Network Security Platform 9.2 (9.2.7.22-9.2.7.20 Manager-Virtual IPS Release Notes) Contents About this release New features Enhancements Resolved issues Installation instructions Known issues Product
More informationLesson 2: Using the Performance Console
Lesson 2 Lesson 2: Using the Performance Console Using the Performance Console 19-13 Windows XP Professional provides two tools for monitoring resource usage: the System Monitor snap-in and the Performance
More informationDeadline Guaranteed Service for Multi- Tenant Cloud Storage Guoxin Liu and Haiying Shen
Deadline Guaranteed Service for Multi- Tenant Cloud Storage Guoxin Liu and Haiying Shen Presenter: Haiying Shen Associate professor *Department of Electrical and Computer Engineering, Clemson University,
More informationWhen dynamic VM migration falls under the control of VM user
When dynamic VM migration falls under the control of VM user Kahina LAZRI, Sylvie LANIEPCE, Haiming ZHENG IMT/OLPS/ASE/SEC/NPS Orange Labs, Caen Jalel Ben-Othman L2TI laboratory Paris13 Symposium sur la
More informationMicrosoft SQL Server in a VMware Environment on Dell PowerEdge R810 Servers and Dell EqualLogic Storage
Microsoft SQL Server in a VMware Environment on Dell PowerEdge R810 Servers and Dell EqualLogic Storage A Dell Technical White Paper Dell Database Engineering Solutions Anthony Fernandez April 2010 THIS
More informationIX: A Protected Dataplane Operating System for High Throughput and Low Latency
IX: A Protected Dataplane Operating System for High Throughput and Low Latency Belay, A. et al. Proc. of the 11th USENIX Symp. on OSDI, pp. 49-65, 2014. Reviewed by Chun-Yu and Xinghao Li Summary In this
More informationNetwork Security Platform 8.1
8.1.7.5-8.1.3.43 M-series Release Notes Network Security Platform 8.1 Revision A Contents About this release New features Enhancements Resolved issues Installation instructions Known issues Product documentation
More informationNetwork Security Platform 8.1
8.1.7.82-8.1.7.34 Manager-Virtual IPS Release Notes Network Security Platform 8.1 Revision A Contents About this release New features Enhancements Resolved issues Installation instructions Known issues
More informationNetwork Security Platform 8.1
8.1.7.91-8.1.7.44 Manager-Virtual IPS Release Notes Network Security Platform 8.1 Revision B Contents About this release New features Enhancements Resolved issues Installation instructions Known issues
More informationA Look at Intel s Dataplane Development Kit
A Look at Intel s Dataplane Development Kit Dominik Scholz Chair for Network Architectures and Services Department for Computer Science Technische Universität München June 13, 2014 Dominik Scholz: A Look
More informationComputer Security: Principles and Practice
Computer Security: Principles and Practice Chapter 6 Intrusion Detection First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Intruders significant issue hostile/unwanted
More informationManaging Hardware Power Saving Modes for High Performance Computing
Managing Hardware Power Saving Modes for High Performance Computing Second International Green Computing Conference 2011, Orlando Timo Minartz, Michael Knobloch, Thomas Ludwig, Bernd Mohr timo.minartz@informatik.uni-hamburg.de
More informationJaal: Towards Network Intrusion Detection at ISP Scale
Jaal: Towards Network Intrusion Detection at ISP Scale A. Aqil, K. Khalil, A. Atya, E. Paplexakis, S. Krishnamurthy, KK. Ramakrishnan University of California Riverside T. Jaeger Penn State University
More informationDESIGN, IMPLEMENTATION, AND OPERATION OF IPV6-ONLY IAAS SYSTEM WITH IPV4-IPV6 TRANSLATOR FOR TRANSITION TOWARD THE FUTURE INTERNET DATACENTER
DESIGN, IMPLEMENTATION, AND OPERATION OF IPV6-ONLY IAAS SYSTEM WITH IPV4-IPV6 TRANSLATOR FOR TRANSITION TOWARD THE FUTURE INTERNET DATACENTER Keiichi SHIMA 1 (Presenter) Wataru ISHIDA 2 Yuji SEKIYA 2 1
More informationKUHN COMMUNICATIONS, INC BROADBAND INTERNET ACCESS SERVICE DISCLOSURES
KUHN COMMUNICATIONS, INC BROADBAND INTERNET ACCESS SERVICE DISCLOSURES Consistent with FCC regulations, 1 Kuhn Communications, Inc. referred to as Kuhn Communications, provides this information about our
More informationMcAfee Network Security Platform 8.3
8.3.7.28-8.3.3.9 Manager-Mxx30-series Release Notes McAfee Network Security Platform 8.3 Revision C Contents About this release New features Enhancements Resolved issues Installation instructions Known
More informationMcAfee Network Security Platform 8.3
8.3.7.44-8.3.7.14 Manager-Virtual IPS Release Notes McAfee Network Security Platform 8.3 Revision A Contents About this release New features Enhancements Resolved issues Installation instructions Known
More informationDelay Injection for. Service Dependency Detection
Delay Injection for Service Dependency Detection Richard A. Kemmerer Computer Security Group Department of Computer Science University of California, Santa Barbara http://seclab.cs.ucsb.edu ARO/MURI Meeting
More informationEmerging Threat Intelligence using IDS/IPS. Chris Arman Kiloyan
Emerging Threat Intelligence using IDS/IPS Chris Arman Kiloyan Who Am I? Chris AUA Graduate (CS) Thesis : Cyber Deception Automation and Threat Intelligence Evaluation Using IDS Integration with Next-Gen
More informationMARACAS: A Real-Time Multicore VCPU Scheduling Framework
: A Real-Time Framework Computer Science Department Boston University Overview 1 2 3 4 5 6 7 Motivation platforms are gaining popularity in embedded and real-time systems concurrent workload support less
More informationDisclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme
NET1343BU NSX Performance Samuel Kommu #VMworld #NET1343BU Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no
More informationLoad Balancing in Distributed System through Task Migration
Load Balancing in Distributed System through Task Migration Santosh Kumar Maurya 1 Subharti Institute of Technology & Engineering Meerut India Email- santoshranu@yahoo.com Khaleel Ahmad 2 Assistant Professor
More information