Realtime Malicious Traffic Detection Targeted for TCP Out-of-Order Packets Based on FPGA

Currently, with the increasing popularity of high-speed network, in order to protect the network environment, more and more companies start to explore how to efficiently detect malicious traffic. On the software side, traditional detection systems are usually based on CPU which will consume multi-co...

Full description

Bibliographic Details
Main Authors: Zhenguo Hu, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada
Format: Article
Language:English
Published: IEEE 2023-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/10278400/
_version_ 1797658021511299072
author Zhenguo Hu
Hirokazu Hasegawa
Yukiko Yamaguchi
Hajime Shimada
author_facet Zhenguo Hu
Hirokazu Hasegawa
Yukiko Yamaguchi
Hajime Shimada
author_sort Zhenguo Hu
collection DOAJ
description Currently, with the increasing popularity of high-speed network, in order to protect the network environment, more and more companies start to explore how to efficiently detect malicious traffic. On the software side, traditional detection systems are usually based on CPU which will consume multi-core processing ability to handle huge network traffic. On the hardware side, current researches focus on using specific hardware to offload some functions such as string matching in malicious traffic detection. However, they cannot detect attack behaviors hidden in TCP out-of-order (OOO) packets well, which are very common in modern complex network environments. To deal with this problem, we present an FPGA-based realtime malicious traffic detection method especially to inspect TCP OOO packets. It employs two core function designs for efficient malicious traffic inspection: TCP OOO reassembly and hierarchical packet match. First, the TCP OOO packets are reassembled to in-order packets to prevent the omission check of malicious traffic. Second, we adapt a hierarchical packet match design which can not only detect the packet header and filter the matching traffic, but also has the ability to inspect the carried payload to further determine whether the traffic is benign or malicious. We use Xilinx Alveo U50 accelerator card as the implementation platform to achieve high speed detection. This paper aims to provide a full detection path and implement all the reassembly and inspection process within an FPGA board. We adapt Cisco TRex as the traffic generator to evaluate the system from detection throughput, resource utilization and power consumption. Compared with the CPU-based approaches, the experiment results show that our system has 485% detection throughput increase and 68% average power decrease.
first_indexed 2024-03-11T17:53:06Z
format Article
id doaj.art-64b996bc31d643ce9668dcb37c8b39a9
institution Directory Open Access Journal
issn 2169-3536
language English
last_indexed 2024-03-11T17:53:06Z
publishDate 2023-01-01
publisher IEEE
record_format Article
series IEEE Access
spelling doaj.art-64b996bc31d643ce9668dcb37c8b39a92023-10-17T23:00:25ZengIEEEIEEE Access2169-35362023-01-011111221211222210.1109/ACCESS.2023.332385310278400Realtime Malicious Traffic Detection Targeted for TCP Out-of-Order Packets Based on FPGAZhenguo Hu0https://orcid.org/0009-0005-1889-0720Hirokazu Hasegawa1Yukiko Yamaguchi2Hajime Shimada3Graduate School of Informatics, Nagoya University, Nagoya, JapanCenter for Strategic Cyber Resilience Research and Development, National Institute of Informatics, Tokyo, JapanInformation Technology Center, Nagoya University, Nagoya, JapanInformation Technology Center, Nagoya University, Nagoya, JapanCurrently, with the increasing popularity of high-speed network, in order to protect the network environment, more and more companies start to explore how to efficiently detect malicious traffic. On the software side, traditional detection systems are usually based on CPU which will consume multi-core processing ability to handle huge network traffic. On the hardware side, current researches focus on using specific hardware to offload some functions such as string matching in malicious traffic detection. However, they cannot detect attack behaviors hidden in TCP out-of-order (OOO) packets well, which are very common in modern complex network environments. To deal with this problem, we present an FPGA-based realtime malicious traffic detection method especially to inspect TCP OOO packets. It employs two core function designs for efficient malicious traffic inspection: TCP OOO reassembly and hierarchical packet match. First, the TCP OOO packets are reassembled to in-order packets to prevent the omission check of malicious traffic. Second, we adapt a hierarchical packet match design which can not only detect the packet header and filter the matching traffic, but also has the ability to inspect the carried payload to further determine whether the traffic is benign or malicious. We use Xilinx Alveo U50 accelerator card as the implementation platform to achieve high speed detection. This paper aims to provide a full detection path and implement all the reassembly and inspection process within an FPGA board. We adapt Cisco TRex as the traffic generator to evaluate the system from detection throughput, resource utilization and power consumption. Compared with the CPU-based approaches, the experiment results show that our system has 485% detection throughput increase and 68% average power decrease.https://ieeexplore.ieee.org/document/10278400/FPGAhardware accelerationmalicious traffic detection
spellingShingle Zhenguo Hu
Hirokazu Hasegawa
Yukiko Yamaguchi
Hajime Shimada
Realtime Malicious Traffic Detection Targeted for TCP Out-of-Order Packets Based on FPGA
IEEE Access
FPGA
hardware acceleration
malicious traffic detection
title Realtime Malicious Traffic Detection Targeted for TCP Out-of-Order Packets Based on FPGA
title_full Realtime Malicious Traffic Detection Targeted for TCP Out-of-Order Packets Based on FPGA
title_fullStr Realtime Malicious Traffic Detection Targeted for TCP Out-of-Order Packets Based on FPGA
title_full_unstemmed Realtime Malicious Traffic Detection Targeted for TCP Out-of-Order Packets Based on FPGA
title_short Realtime Malicious Traffic Detection Targeted for TCP Out-of-Order Packets Based on FPGA
title_sort realtime malicious traffic detection targeted for tcp out of order packets based on fpga
topic FPGA
hardware acceleration
malicious traffic detection
url https://ieeexplore.ieee.org/document/10278400/
work_keys_str_mv AT zhenguohu realtimemalicioustrafficdetectiontargetedfortcpoutoforderpacketsbasedonfpga
AT hirokazuhasegawa realtimemalicioustrafficdetectiontargetedfortcpoutoforderpacketsbasedonfpga
AT yukikoyamaguchi realtimemalicioustrafficdetectiontargetedfortcpoutoforderpacketsbasedonfpga
AT hajimeshimada realtimemalicioustrafficdetectiontargetedfortcpoutoforderpacketsbasedonfpga