透過您的圖書館登入
IP:13.59.236.219
  • 學位論文

硬體上的封包狀態檢查系統設計與實作

A Hardware-Based Stateful Packet Inspection System Design and Implementation

指導教授 : 王勝德

摘要


TCP通訊協定缺乏安全機制、尤其對於阻斷服務攻擊(DoS),網路資源易於嚴重佔用,雖然目前都許多文獻及商品宣稱對於阻斷服務攻擊有保護的功能,但不能完全阻擋,也可能產生誤判;狀態封包檢測(Stateful Packet Inspection, SPI)是目前比較新的技術,可以有效抵制SYN洪流(SYN Flooding)的攻擊,許多文獻會對此主題進行探討。本論文主要討論是在SPI技術以及相關的連線表(Session Table)資料結構。作為連線表的資料結構必須能支援:(1)匹配時採用定長匹配技術,(2)表的項目數量龐大,(3)表的插入及刪除動作頻繁,(4)表的數據寬度較寬。因此尋找一個符合以上特性的演算法非常重要。PATRICIA演算法的特色是: (1)空間複雜度不變,(2)搜尋、插入、刪除效能優異,(3)適合硬體實作;所以PATRICIA演算法適合於連線表;文獻上已有方法改善插入動作,使得插入時,不用再重新搜尋一遍。本論文提出雙向的PAT-FM演算法,進一步改善刪除動作,在每一個node中能記錄上一層node的位址,使得刪除時,能得到固定的刪除處理時間,進而讓整體更有效率,模擬所得的結果證明本論文所提的方法的確能改善整體的執行效率。另外,實作後下載到Xilinx ML-405上驗證,也證明雙向PAT-FM可以在真正的硬體上正常動作。

關鍵字

封包分類 狀態 連線表

並列摘要


The security-related deficiencies in the TCP/IP protocol make networks vulnerable to intruders. The denial-of-service (DoS) attacks are such intrusions that saturate the target of victim machine with external communications requests, such that it cannot respond to its intended users. Stateful Packet Inspection (SPI) is a key technology that makes a stateful firewall able to hold in memory significant attributes of connections to prevent DoS attacks, such as SYN flooding, the most common DoS attack on the Internet. In this paper, we first investigate SPI technologies and related session table architectures in order to improve the performance of firewall machines. The PATRICIA tree is good at supporting the expensive match, insert, and delete operations in the session table. In this thesis, we use a kind of PATRICIA tree, called Doubly Link PAT-FM algorithm and improve the delete operations. Finally, we implemented the proposed system in hardware and experimental results show its effectiveness.

參考文獻


[20] 鍾佳芳, “設計與實作狀態化高速入侵偵測系統”, 碩士論文, 台灣大學資訊工程研究所, 2005
[1] N. A. Noureldien and I. M. Osman., “A Stateful Inspection ModuleArchitecture,” in Proc. TENCON 2000 vol. 2, 2000, pp. 259 - 265,.
[2] X. Li, Z. Z. Ji, and M. Z. Hu. “Stateful Inspection firewall session table processing,” 2005. in Proc. Coding and Computing (ITCC'05) vol 2, 2005, pp. 615 - 620
[5] C. Y. Huang, K. T. Chen, and C. L. Lei. “Mitigating Active Attacks Towards Client Networks Using the Bitmap Filter.”, in Proc. Dependable Systems and Networks (DSN'06), 2006, pp.403 - 412
[6] C. L. Schuba, I. V. Krsul, and M. G. Kuhn, “Analysis of a Denial of Service Attack on TCP.”, in Proc. 1997 IEEE Symposium on Security and Privacy, 1997, pp. 208 - 223

延伸閱讀