SlideShare a Scribd company logo
1 of 12
Matteo Avalle
Annual Oral Presentation
For Ph.D Evaluation
2012 (Second Ph.D year)
Main research topic:
regexp-based packet processing
Outline


          • Background
          • Research directions
          • Results
Background
• Regexp-based data processing:
  – Powerful technique to analyze data
  – Several possible application fields (e.g NIDS).
• Rule sets must be transformed in automata (in
  our case NFAs)
• NFAs can then be used to parse data by using a
  packet processor
  – iNFAnt, a GPU-based packet processor
• Processing throughput is critical

                           2/10
                           Main:   • • • • Sec: • • •
Main research directions
There is a technique, called multi-stride:
•Based on transforming the NFA into a more efficient form
•Multiplies the processing throughput by a factor of 2n

But:                         For these reasons:
• “n” depends on the size    •A new, faster multistride
  of the rule set, and is    algorithm has been developed
  usually very small         •Test cases have been
• Obtaining a 4x NFA of a
                             developed by applying
  medium ruleset requires    multistride to huge rule sets
  several months of
  computation
• Inapplicable to big
  rulesets                  3/10
                            Main:   • • • • Sec: • • •
Main research directions
• The new multistride algorithm pushes forwards the limits
  of the previous algorithms

But:                            For these reasons:
• Even with faster              •A new technique, called
  algorithms, multi stride      multi-map multistride has
  still have limits             been developed
• It should be possible to      •It exploits GPU architecture
  optimize NFAs to
                                •It allows to further push
  achieve better results
  when using GPU-based          forward the limits of the
  processors                    original multistride


                             4/10
                             Main:   • • • • Sec: • • •
Obtained results
•   With the new “Multi-Stride” algorithm it is now possible to quadruple
    the processing throughput of medium-sized NFAs while the previous
    algorithms did not allow to achieve more than a 2x boost on the
    same NFAs
     – M. Avalle, F. Risso, R. Sisto, “Efficient Multistriding of Large Non-
       deterministic Finite State Automata for Deep Packet Inspection”, in Proc. of
       the IEEE International Conference on Communications (ICC) 2012 –
       Communication and Information Systems Security Symposium.


•   The new “Multi-Map Multistride” technique further extends the
    previous limits by multiplying the processing throughput of bigger
    NFAs and with higher coefficients
     – A paper is under development to present results of this algorithm




                                          5/10
                                          Main:   • • • • Sec: • • •
Secondary research topic:
 Design and implementation of
 Security protocols with javaSPI
Outline


          • Background
          • Our solution: JavaSPI
          • Results
Background
• Developing a security protocol is an hard, error-
  prone task even for experts
• Formal methods can be the key to simplify this
  process
  – Mathematical demonstration of the claimed security
    properties
  – Semi-automated generation of the implementation
    code to reduce the presence of bugs
• Anyway, using formal methods is still a complex
  task as the formal languages are usually
  unknown to the developers
                          7/10
                          Main:   • • • • Sec: • • •
Our solution: JavaSPI




         8/10
         Main:   • • • • Sec: • • •
Results
•   The javaSPI tool has been developed
•   A case study, regarding a particular configuration of the SSL 3.0 handshake
    protocol, has been developed
     –   M. Avalle, A. Pironti, R. Sisto D. Pozza, “The Java SPI Framework for Security Protocol
         Implementation”, in Proc. of the Sixth International Conference on Availability, Reliability
         and Security (ARES), Vienna, Austria, pp. 746-751, IEEE, 2011.


•   Moreover, there is an article under development to present the
    mathematical Soundness proofs of javaSPI.

•   A survey regarding the state of the art of formal methods applied to security
    protocols have been written
     –   M. Avalle, A. Pironti, R. Sisto, “Formal Verification of Security Protocol
         Implementations: A Survey”, accepted for publication in Formal Aspects of Computing,
         Springer.



                                                9/10
                                                Main:   • • • • Sec: • • •
Future work
• The first, short-term objective is to finish the
  actual work by publishing the papers under
  development regarding both the research topics

• Moreover, there should still be room to improve
  the performance of actual techniques by
  implementing new GPU-specific optimization
  techniques.


                        10/10
Questions?

More Related Content

Viewers also liked

Chris Batt PhD progress report
Chris Batt PhD progress reportChris Batt PhD progress report
Chris Batt PhD progress reportChris Batt
 
Towards a socially adaptive digital playground dr consortium
Towards a socially adaptive digital playground dr consortiumTowards a socially adaptive digital playground dr consortium
Towards a socially adaptive digital playground dr consortiumRobby van Delden
 
PhD confirmation presentation
PhD confirmation presentationPhD confirmation presentation
PhD confirmation presentationHannah Brasier
 
Thesis Midterm presentation
Thesis Midterm presentationThesis Midterm presentation
Thesis Midterm presentationOana Sipos
 
Body Painting
Body Painting Body Painting
Body Painting Vili 48
 
PhD Confirmation
PhD ConfirmationPhD Confirmation
PhD ConfirmationNathan Eva
 
M.Sc. Research Progress Presentation
M.Sc. Research Progress PresentationM.Sc. Research Progress Presentation
M.Sc. Research Progress PresentationLighton Phiri
 
PhD Annual Report first page & detailed table of contents
PhD Annual Report first page & detailed table of contentsPhD Annual Report first page & detailed table of contents
PhD Annual Report first page & detailed table of contentssakiforacause
 
My thesis progress presentation
My thesis progress presentationMy thesis progress presentation
My thesis progress presentationJames Thomas
 
Bad Girls Club-season 9 sneak peack
Bad Girls Club-season 9 sneak peackBad Girls Club-season 9 sneak peack
Bad Girls Club-season 9 sneak peackJay Jaay
 
Virginity and Defloration and its medicolegal aspects
Virginity and Defloration and its medicolegal aspectsVirginity and Defloration and its medicolegal aspects
Virginity and Defloration and its medicolegal aspectsDr Vivek Kumar
 
Playboy Strategy
Playboy StrategyPlayboy Strategy
Playboy StrategyKeith Loo
 
Examination of victim of rape
Examination of victim of rapeExamination of victim of rape
Examination of victim of rapeSUNIL SHARMA
 
Examination of rape victim
Examination of rape victimExamination of rape victim
Examination of rape victimBhaumesh Rajdev
 

Viewers also liked (20)

2nd year PHD Report
2nd year PHD Report2nd year PHD Report
2nd year PHD Report
 
Chris Batt PhD progress report
Chris Batt PhD progress reportChris Batt PhD progress report
Chris Batt PhD progress report
 
Towards a socially adaptive digital playground dr consortium
Towards a socially adaptive digital playground dr consortiumTowards a socially adaptive digital playground dr consortium
Towards a socially adaptive digital playground dr consortium
 
PhD confirmation presentation
PhD confirmation presentationPhD confirmation presentation
PhD confirmation presentation
 
Thesis Midterm presentation
Thesis Midterm presentationThesis Midterm presentation
Thesis Midterm presentation
 
Body Painting
Body Painting Body Painting
Body Painting
 
PhD Confirmation
PhD ConfirmationPhD Confirmation
PhD Confirmation
 
M.Sc. Research Progress Presentation
M.Sc. Research Progress PresentationM.Sc. Research Progress Presentation
M.Sc. Research Progress Presentation
 
PhD Annual Report first page & detailed table of contents
PhD Annual Report first page & detailed table of contentsPhD Annual Report first page & detailed table of contents
PhD Annual Report first page & detailed table of contents
 
My thesis progress presentation
My thesis progress presentationMy thesis progress presentation
My thesis progress presentation
 
1 Year PhD Presentation
1 Year PhD Presentation1 Year PhD Presentation
1 Year PhD Presentation
 
Fucking
FuckingFucking
Fucking
 
All inn
All innAll inn
All inn
 
Bad Girls Club-season 9 sneak peack
Bad Girls Club-season 9 sneak peackBad Girls Club-season 9 sneak peack
Bad Girls Club-season 9 sneak peack
 
Virginity and Defloration and its medicolegal aspects
Virginity and Defloration and its medicolegal aspectsVirginity and Defloration and its medicolegal aspects
Virginity and Defloration and its medicolegal aspects
 
Playboy Strategy
Playboy StrategyPlayboy Strategy
Playboy Strategy
 
Sexting
SextingSexting
Sexting
 
Examination of victim of rape
Examination of victim of rapeExamination of victim of rape
Examination of victim of rape
 
SEXUAL OFFENCES
SEXUAL OFFENCESSEXUAL OFFENCES
SEXUAL OFFENCES
 
Examination of rape victim
Examination of rape victimExamination of rape victim
Examination of rape victim
 

Similar to Matteo Avalle's 2012 PhD Annual Oral Presentation on Regexp Packet Processing and Security Protocol Design

SCAPE - Scalable Preservation Environments
SCAPE - Scalable Preservation EnvironmentsSCAPE - Scalable Preservation Environments
SCAPE - Scalable Preservation EnvironmentsSCAPE Project
 
A personal journey towards more reproducible networking research
A personal journey towards more reproducible networking researchA personal journey towards more reproducible networking research
A personal journey towards more reproducible networking researchOlivier Bonaventure
 
Scientific Workflows Systems :In Drug discovery informatics
Scientific Workflows Systems :In Drug discovery informaticsScientific Workflows Systems :In Drug discovery informatics
Scientific Workflows Systems :In Drug discovery informatics Khaled Tumbi
 
Ph.D Annual Report III
Ph.D Annual Report IIIPh.D Annual Report III
Ph.D Annual Report IIIMatteo Avalle
 
Coverage Solutions on Emulators
Coverage Solutions on EmulatorsCoverage Solutions on Emulators
Coverage Solutions on EmulatorsDVClub
 
HiPEAC 2019 Tutorial - Maestro RTOS
HiPEAC 2019 Tutorial - Maestro RTOSHiPEAC 2019 Tutorial - Maestro RTOS
HiPEAC 2019 Tutorial - Maestro RTOSTulipp. Eu
 
Low-Cost ICS Network Performance Testing
Low-Cost ICS Network Performance TestingLow-Cost ICS Network Performance Testing
Low-Cost ICS Network Performance TestingJim Gilsinn
 
Test Tool for Industrial Ethernet Network Performance (June 2009)
Test Tool for Industrial Ethernet Network Performance (June 2009)Test Tool for Industrial Ethernet Network Performance (June 2009)
Test Tool for Industrial Ethernet Network Performance (June 2009)Jim Gilsinn
 
Monitoring federation open stack infrastructure
Monitoring federation open stack infrastructureMonitoring federation open stack infrastructure
Monitoring federation open stack infrastructureFernando Lopez Aguilar
 
Configuration Management Evolution at CERN
Configuration Management Evolution at CERNConfiguration Management Evolution at CERN
Configuration Management Evolution at CERNGavin McCance
 
SC15 PMIx Birds-of-a-Feather
SC15 PMIx Birds-of-a-FeatherSC15 PMIx Birds-of-a-Feather
SC15 PMIx Birds-of-a-Featherrcastain
 
12.00 - Dr. Tim Chown - University of Southampton
12.00 - Dr. Tim Chown - University of Southampton12.00 - Dr. Tim Chown - University of Southampton
12.00 - Dr. Tim Chown - University of SouthamptonIPv6 Summit 2010
 
Using RARE/FreeRtr for the Janet network performance test facility
Using RARE/FreeRtr for the Janet network performance test facility Using RARE/FreeRtr for the Janet network performance test facility
Using RARE/FreeRtr for the Janet network performance test facility Jisc
 
Mauricio breteernitiz hpc-exascale-iscte
Mauricio breteernitiz hpc-exascale-iscteMauricio breteernitiz hpc-exascale-iscte
Mauricio breteernitiz hpc-exascale-isctembreternitz
 
Grid'5000: Running a Large Instrument for Parallel and Distributed Computing ...
Grid'5000: Running a Large Instrument for Parallel and Distributed Computing ...Grid'5000: Running a Large Instrument for Parallel and Distributed Computing ...
Grid'5000: Running a Large Instrument for Parallel and Distributed Computing ...Frederic Desprez
 

Similar to Matteo Avalle's 2012 PhD Annual Oral Presentation on Regexp Packet Processing and Security Protocol Design (20)

SCAPE - Scalable Preservation Environments
SCAPE - Scalable Preservation EnvironmentsSCAPE - Scalable Preservation Environments
SCAPE - Scalable Preservation Environments
 
SniffJoke 0.4
SniffJoke 0.4SniffJoke 0.4
SniffJoke 0.4
 
A personal journey towards more reproducible networking research
A personal journey towards more reproducible networking researchA personal journey towards more reproducible networking research
A personal journey towards more reproducible networking research
 
tip oopt pse-summit2017
tip oopt pse-summit2017tip oopt pse-summit2017
tip oopt pse-summit2017
 
Scientific Workflows Systems :In Drug discovery informatics
Scientific Workflows Systems :In Drug discovery informaticsScientific Workflows Systems :In Drug discovery informatics
Scientific Workflows Systems :In Drug discovery informatics
 
Ph.D Annual Report III
Ph.D Annual Report IIIPh.D Annual Report III
Ph.D Annual Report III
 
Coverage Solutions on Emulators
Coverage Solutions on EmulatorsCoverage Solutions on Emulators
Coverage Solutions on Emulators
 
HiPEAC 2019 Tutorial - Maestro RTOS
HiPEAC 2019 Tutorial - Maestro RTOSHiPEAC 2019 Tutorial - Maestro RTOS
HiPEAC 2019 Tutorial - Maestro RTOS
 
Low-Cost ICS Network Performance Testing
Low-Cost ICS Network Performance TestingLow-Cost ICS Network Performance Testing
Low-Cost ICS Network Performance Testing
 
Test Tool for Industrial Ethernet Network Performance (June 2009)
Test Tool for Industrial Ethernet Network Performance (June 2009)Test Tool for Industrial Ethernet Network Performance (June 2009)
Test Tool for Industrial Ethernet Network Performance (June 2009)
 
Monitoring federation open stack infrastructure
Monitoring federation open stack infrastructureMonitoring federation open stack infrastructure
Monitoring federation open stack infrastructure
 
Configuration Management Evolution at CERN
Configuration Management Evolution at CERNConfiguration Management Evolution at CERN
Configuration Management Evolution at CERN
 
SC15 PMIx Birds-of-a-Feather
SC15 PMIx Birds-of-a-FeatherSC15 PMIx Birds-of-a-Feather
SC15 PMIx Birds-of-a-Feather
 
12.00 - Dr. Tim Chown - University of Southampton
12.00 - Dr. Tim Chown - University of Southampton12.00 - Dr. Tim Chown - University of Southampton
12.00 - Dr. Tim Chown - University of Southampton
 
OpenVINO introduction
OpenVINO introductionOpenVINO introduction
OpenVINO introduction
 
Christopher_Reder_2016
Christopher_Reder_2016Christopher_Reder_2016
Christopher_Reder_2016
 
Using RARE/FreeRtr for the Janet network performance test facility
Using RARE/FreeRtr for the Janet network performance test facility Using RARE/FreeRtr for the Janet network performance test facility
Using RARE/FreeRtr for the Janet network performance test facility
 
Mauricio breteernitiz hpc-exascale-iscte
Mauricio breteernitiz hpc-exascale-iscteMauricio breteernitiz hpc-exascale-iscte
Mauricio breteernitiz hpc-exascale-iscte
 
HiPipe Professional
HiPipe ProfessionalHiPipe Professional
HiPipe Professional
 
Grid'5000: Running a Large Instrument for Parallel and Distributed Computing ...
Grid'5000: Running a Large Instrument for Parallel and Distributed Computing ...Grid'5000: Running a Large Instrument for Parallel and Distributed Computing ...
Grid'5000: Running a Large Instrument for Parallel and Distributed Computing ...
 

Matteo Avalle's 2012 PhD Annual Oral Presentation on Regexp Packet Processing and Security Protocol Design

  • 1. Matteo Avalle Annual Oral Presentation For Ph.D Evaluation 2012 (Second Ph.D year)
  • 2. Main research topic: regexp-based packet processing Outline • Background • Research directions • Results
  • 3. Background • Regexp-based data processing: – Powerful technique to analyze data – Several possible application fields (e.g NIDS). • Rule sets must be transformed in automata (in our case NFAs) • NFAs can then be used to parse data by using a packet processor – iNFAnt, a GPU-based packet processor • Processing throughput is critical 2/10 Main: • • • • Sec: • • •
  • 4. Main research directions There is a technique, called multi-stride: •Based on transforming the NFA into a more efficient form •Multiplies the processing throughput by a factor of 2n But: For these reasons: • “n” depends on the size •A new, faster multistride of the rule set, and is algorithm has been developed usually very small •Test cases have been • Obtaining a 4x NFA of a developed by applying medium ruleset requires multistride to huge rule sets several months of computation • Inapplicable to big rulesets 3/10 Main: • • • • Sec: • • •
  • 5. Main research directions • The new multistride algorithm pushes forwards the limits of the previous algorithms But: For these reasons: • Even with faster •A new technique, called algorithms, multi stride multi-map multistride has still have limits been developed • It should be possible to •It exploits GPU architecture optimize NFAs to •It allows to further push achieve better results when using GPU-based forward the limits of the processors original multistride 4/10 Main: • • • • Sec: • • •
  • 6. Obtained results • With the new “Multi-Stride” algorithm it is now possible to quadruple the processing throughput of medium-sized NFAs while the previous algorithms did not allow to achieve more than a 2x boost on the same NFAs – M. Avalle, F. Risso, R. Sisto, “Efficient Multistriding of Large Non- deterministic Finite State Automata for Deep Packet Inspection”, in Proc. of the IEEE International Conference on Communications (ICC) 2012 – Communication and Information Systems Security Symposium. • The new “Multi-Map Multistride” technique further extends the previous limits by multiplying the processing throughput of bigger NFAs and with higher coefficients – A paper is under development to present results of this algorithm 5/10 Main: • • • • Sec: • • •
  • 7. Secondary research topic: Design and implementation of Security protocols with javaSPI Outline • Background • Our solution: JavaSPI • Results
  • 8. Background • Developing a security protocol is an hard, error- prone task even for experts • Formal methods can be the key to simplify this process – Mathematical demonstration of the claimed security properties – Semi-automated generation of the implementation code to reduce the presence of bugs • Anyway, using formal methods is still a complex task as the formal languages are usually unknown to the developers 7/10 Main: • • • • Sec: • • •
  • 9. Our solution: JavaSPI 8/10 Main: • • • • Sec: • • •
  • 10. Results • The javaSPI tool has been developed • A case study, regarding a particular configuration of the SSL 3.0 handshake protocol, has been developed – M. Avalle, A. Pironti, R. Sisto D. Pozza, “The Java SPI Framework for Security Protocol Implementation”, in Proc. of the Sixth International Conference on Availability, Reliability and Security (ARES), Vienna, Austria, pp. 746-751, IEEE, 2011. • Moreover, there is an article under development to present the mathematical Soundness proofs of javaSPI. • A survey regarding the state of the art of formal methods applied to security protocols have been written – M. Avalle, A. Pironti, R. Sisto, “Formal Verification of Security Protocol Implementations: A Survey”, accepted for publication in Formal Aspects of Computing, Springer. 9/10 Main: • • • • Sec: • • •
  • 11. Future work • The first, short-term objective is to finish the actual work by publishing the papers under development regarding both the research topics • Moreover, there should still be room to improve the performance of actual techniques by implementing new GPU-specific optimization techniques. 10/10