skip to main content
10.1145/2881025.2881034acmconferencesArticle/Chapter ViewAbstractPublication PagesancsConference Proceedingsconference-collections
research-article
Public Access

O3FA: A Scalable Finite Automata-based Pattern-Matching Engine for Out-of-Order Deep Packet Inspection

Published: 17 March 2016 Publication History

Abstract

To match the signatures of malicious traffic across packet boundaries, network-intrusion detection (and prevention) systems (NIDS) typically perform pattern matching after flow reassembly or packet reordering. However, this may lead to the need for large packet buffers, making detection vulnerable to denial-of-service (DoS) attacks, whereby attackers exhaust the buffer capacity by sending long sequences of out-of-order packets. While researchers have proposed solutions for exact-match patterns, regular-expression matching on out-of-order packets is still an open problem. Specifically, a key challenge is the matching of complex sub-patterns (such as repetitions of wildcards matched at the boundary between packets). Our proposed approach leverages the insight that various segments matching the same repetitive sub-pattern are logically equivalent to the regular-expression matching engine, and thus, inter-changing them would not affect the final result. In this paper, we present O3FA, a new finite automata-based, deep packet-inspection engine to perform regular-expression matching on out-of-order packets without requiring flow reassembly. O3FA consists of a deterministic finite automaton (FA) coupled with a set of prefix-/suffix-FA, which allows processing out-of-order packets on the fly. We present our design, optimization, and evaluation for the O3FA engine. Our experiments show that our design requires 20x-4000x less buffer space than conventional buffering-and-reassembling schemes on various datasets and that it can process packets in real-time, i.e., without reassembly.

References

[1]
J. Newsome, B. Karp, and D. Song, "Polygraph: automatically generating signatures for polymorphic worms," in IEEE Symposium Security and Privacy, 2005.
[2]
R. Sommer and V. Paxson, "Enhancing byte-level network intrusion detection signatures with context," in Proc. of CCS 2003.
[3]
Y. Xie, et al., "Spamming botnets: signatures and characteristics," in Proc. of SIGCOMM 2008.
[4]
R. M. J. Hopcroft, and J. Ullman, Introduction to Automata Theory, Languages, and Computation: Addison Wesley, 1979.
[5]
B. C. Brodie, D. E. Taylor, and R. K. Cytron, "A Scalable Architecture For High-Throughput Regular-Expression Pattern Matching," in Proc. of ISCA 2006.
[6]
F. Yu, et al., "Fast and memory-efficient regular expression matching for deep packet inspection," in Proc. of ANCS 2006.
[7]
M. Becchi and P. Crowley, "A hybrid finite automaton for practical deep packet inspection," in Proc. of CoNEXT 2007.
[8]
S. Kumar, et al., "Curing regular expressions matching algorithms from insomnia, amnesia, and acalculia," in Proc. of ANCS 2007.
[9]
R. Smith, et al., "Deflating the big bang: fast and scalable deep packet inspection with extended finite automata," in Proc. of SIGCOMM 2008.
[10]
M. Becchi and P. Crowley, "Extending finite automata to efficiently match Perl-compatible regular expressions," in Proc. of CoNEXT 2008.
[11]
X. Yu, B. Lin, and M. Becchi, "Revisiting State Blow-Up: Automatically Building Augmented-FA While Preserving Functional Equivalence," in JSAC, vol. 32, pp. 1822--1833, 2014.
[12]
V. Paxson, "End-to-end Internet packet dynamics," in Proc. of SIGCOMM 1997.
[13]
J. Sharad, et al., "Measurement and classification of out-of-sequence packets in a tier-1 IP backbone," in Proc. of INFO-COM 2003.
[14]
S. Dharmapurikar and V. Paxson, "Robust TCP stream reas-sembly in the presence of adversaries," in Proc. of USENIX Security Symposium 2005.
[15]
T. Ptacek and T. Newsham, "Insertion, Evasion and Denial of Service: Eluding Network Intrusion Detection," Secure Net-works, Inc. Technical Report, 1998.
[16]
A. E. Saldinger, J. Ding, and S. K. Sathe, "Method and apparatus for ensuring ATM cell order in multiple cell transmission lane switching system," US Patent, 1999.
[17]
A. S. J. Chapman and H. T. Kung, "Method and apparatus for re-ordering data packets in a network environment," US Patent, 2001.
[18]
A. V. Rana and C. A. Garrow, "Queue engine for reassembling and reordering data packets in a network," US Patent 2004.
[19]
M. Zhang and J.-b. Ju, "Space-Economical Reassembly for Intrusion Detection System," in Information and Communications Security. vol. 2836, ed: Springer Berlin Heidelberg, 2003, pp. 393--404.
[20]
X. Chen, et al., "AC-Suffix-Tree: Buffer Free String Matching on Out-of-Sequence Packets," in Proc. of ANCS 2011.
[21]
T. Johnson, S. Muthukrishnan, and I. Rozenbaum, "Monitoring Regular Expressions on Out-of-Order Streams," in Proc. of ICDE 2007.
[22]
M. Becchi and P. Crowley, "An improved algorithm to accel-erate regular expression evaluation," in Proc. of ANCS 2007.
[23]
S. Kong, R. Smith, and C. Estan, "Efficient signature matching with multiple alphabet compression tables," in Proc. Security and privacy in communication networks, 2008.
[24]
J. Patel, A. X. Liu, and E. Torng, "Bypassing Space Explosion in High-Speed Regular Expression Matching," in TON, vol. 22, pp. 1701--1714, 2014.
[25]
S. Kumar, et al., "Algorithms to accelerate multiple regular expressions matching for deep packet inspection," in Proc. of SIGCOMM 2006.
[26]
D. Ficara, et al., "An improved DFA for fast regular expression matching," SIGCOMM Comput. Commun. Rev., vol. 38, pp. 29--40, 2008.
[27]
G. Varghese, J. A. Fingerhut, and F. Bonomi, "Detecting evasion attacks at high speeds without reassembly," in Proc. of SIGCOMM 2006.
[28]
R. Smith, C. Estan, and S. Jha, "XFA: Faster Signature Matching with Extended Automata," in Symp. Security and Privacy, 2008.
[29]
M. Becchi, M. Franklin, and P. Crowley, "A workload for evaluating deep packet inspection architectures," in Proc. of IISWC 2008.
[30]
C. R. Clark and D. E. Schimmel, "Efficient reconfigurable logic circuits for matching complex network intrusion detection patterns," in Proc. of FPL 2003.
[31]
X. Yu and M. Becchi, "GPU acceleration of regular expression matching for large datasets: exploring the implementation space," presented at the Proc. of CF 2013.

Cited By

View all

Index Terms

  1. O3FA: A Scalable Finite Automata-based Pattern-Matching Engine for Out-of-Order Deep Packet Inspection

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    ANCS '16: Proceedings of the 2016 Symposium on Architectures for Networking and Communications Systems
    March 2016
    148 pages
    ISBN:9781450341837
    DOI:10.1145/2881025
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 17 March 2016

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. finite automata
    2. intrusion detection systems
    3. out-of-order deep packet inspection
    4. regular expressions

    Qualifiers

    • Research-article

    Funding Sources

    • the Institute for Critical Technology and Applied Science (ICTAS), an institute dedicated to transformative, interdisciplinary research for a sustainable future (http://www.ictas.vt.edu)
    • National Science Foundation

    Conference

    ANCS '16

    Acceptance Rates

    ANCS '16 Paper Acceptance Rate 12 of 58 submissions, 21%;
    Overall Acceptance Rate 88 of 314 submissions, 28%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)70
    • Downloads (Last 6 weeks)10
    Reflects downloads up to 01 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media