Comparison of Hash Functions for Network Traffic Acquisition Using a Hardware-Accelerated Probe

In this article we address the problem of efficient and secure monitoring of computer network traffic. We proposed, implemented, and tested a hardware-accelerated implementation of a network probe, using the DE5-Net FPGA development platform. We showed that even when using a cryptographic SHA-3 hash...

Full description

Bibliographic Details
Main Authors: Mateusz Korona, Paweł Szumełda, Mariusz Rawski, Artur Janicki
Format: Article
Language:English
Published: MDPI AG 2022-05-01
Series:Electronics
Subjects:
Online Access:https://www.mdpi.com/2079-9292/11/11/1688
_version_ 1797493730777759744
author Mateusz Korona
Paweł Szumełda
Mariusz Rawski
Artur Janicki
author_facet Mateusz Korona
Paweł Szumełda
Mariusz Rawski
Artur Janicki
author_sort Mateusz Korona
collection DOAJ
description In this article we address the problem of efficient and secure monitoring of computer network traffic. We proposed, implemented, and tested a hardware-accelerated implementation of a network probe, using the DE5-Net FPGA development platform. We showed that even when using a cryptographic SHA-3 hash function, the probe uses less than 17% of the available FPGA resources, offering a throughput of over 20 Gbit/s. We have also researched the problem of choosing an optimal hash function to be used in a network probe for addressing network flows in a flow cache. In our work we compared five 32-bit hash functions, including two cryptographic ones: SHA-1 and SHA-3. We ran a series of experiments with various hash functions, using traffic replayed from the CICIDS 2017 dataset. We showed that SHA-1 and SHA-3 provide flow distributions as uniform as the ones offered by the modified Vermont hash function proposed in 2008 (i.e., with low means and standard deviations of the bucket occupation), yet assuring higher security against potential attacks on a network probe.
first_indexed 2024-03-10T01:24:15Z
format Article
id doaj.art-c6b7c2a65d264880a6379e899a09b024
institution Directory Open Access Journal
issn 2079-9292
language English
last_indexed 2024-03-10T01:24:15Z
publishDate 2022-05-01
publisher MDPI AG
record_format Article
series Electronics
spelling doaj.art-c6b7c2a65d264880a6379e899a09b0242023-11-23T13:54:15ZengMDPI AGElectronics2079-92922022-05-011111168810.3390/electronics11111688Comparison of Hash Functions for Network Traffic Acquisition Using a Hardware-Accelerated ProbeMateusz Korona0Paweł Szumełda1Mariusz Rawski2Artur Janicki3Faculty of Electronics and Information Technology, Warsaw University of Technology, Nowowiejska 15/19, 00-665 Warsaw, PolandFaculty of Electronics and Information Technology, Warsaw University of Technology, Nowowiejska 15/19, 00-665 Warsaw, PolandFaculty of Electronics and Information Technology, Warsaw University of Technology, Nowowiejska 15/19, 00-665 Warsaw, PolandFaculty of Electronics and Information Technology, Warsaw University of Technology, Nowowiejska 15/19, 00-665 Warsaw, PolandIn this article we address the problem of efficient and secure monitoring of computer network traffic. We proposed, implemented, and tested a hardware-accelerated implementation of a network probe, using the DE5-Net FPGA development platform. We showed that even when using a cryptographic SHA-3 hash function, the probe uses less than 17% of the available FPGA resources, offering a throughput of over 20 Gbit/s. We have also researched the problem of choosing an optimal hash function to be used in a network probe for addressing network flows in a flow cache. In our work we compared five 32-bit hash functions, including two cryptographic ones: SHA-1 and SHA-3. We ran a series of experiments with various hash functions, using traffic replayed from the CICIDS 2017 dataset. We showed that SHA-1 and SHA-3 provide flow distributions as uniform as the ones offered by the modified Vermont hash function proposed in 2008 (i.e., with low means and standard deviations of the bucket occupation), yet assuring higher security against potential attacks on a network probe.https://www.mdpi.com/2079-9292/11/11/1688traffic analysisnetwork probehash functionSHA-3FPGA
spellingShingle Mateusz Korona
Paweł Szumełda
Mariusz Rawski
Artur Janicki
Comparison of Hash Functions for Network Traffic Acquisition Using a Hardware-Accelerated Probe
Electronics
traffic analysis
network probe
hash function
SHA-3
FPGA
title Comparison of Hash Functions for Network Traffic Acquisition Using a Hardware-Accelerated Probe
title_full Comparison of Hash Functions for Network Traffic Acquisition Using a Hardware-Accelerated Probe
title_fullStr Comparison of Hash Functions for Network Traffic Acquisition Using a Hardware-Accelerated Probe
title_full_unstemmed Comparison of Hash Functions for Network Traffic Acquisition Using a Hardware-Accelerated Probe
title_short Comparison of Hash Functions for Network Traffic Acquisition Using a Hardware-Accelerated Probe
title_sort comparison of hash functions for network traffic acquisition using a hardware accelerated probe
topic traffic analysis
network probe
hash function
SHA-3
FPGA
url https://www.mdpi.com/2079-9292/11/11/1688
work_keys_str_mv AT mateuszkorona comparisonofhashfunctionsfornetworktrafficacquisitionusingahardwareacceleratedprobe
AT pawełszumełda comparisonofhashfunctionsfornetworktrafficacquisitionusingahardwareacceleratedprobe
AT mariuszrawski comparisonofhashfunctionsfornetworktrafficacquisitionusingahardwareacceleratedprobe
AT arturjanicki comparisonofhashfunctionsfornetworktrafficacquisitionusingahardwareacceleratedprobe