|
Towards Accelerating Intrusion Detection h/ g6 M4 E! t4 y
Operations at the Edge Network using FPGAs - R. B! [6 ^8 r
: W" d7 S7 ?3 B+ A! L1 ?% i8 H# m( g& g5 ]2 @
" W2 ^; ^# A* b
In the current paper, we present our work towards
/ e% n8 O% Q9 |; uaccelerating intrusion detection operations at the edge network
6 a# r/ {2 \5 vusing FPGAs. Cloud computing and network function
E" N$ a( G' O3 b1 avirtualization have led to a new appealing paradigm for service
' g* G- F2 L5 ^5 C: ~" X/ c& B qdelivery and management. Unfortunately, this paradigm fails + W/ ^, x% S' o; Z' `* @( D; m
to correctly support IoT applications and services that seek ! h; S% C, Q/ n* c ?8 Y; U
better communication platforms. Security as a Service can also + R, `7 y8 Z k1 F
be seen as a cloud-based model that needs to be accommodated
6 m1 O7 u, d8 p7 R, p7 N% kto fulfill these services requirements. Again, one of the main $ x0 b0 S7 m6 j U% {
issues to be addressed in this context is how to improve the : p% U6 `3 h% @: T
performance of such systems or services in order to make them
" z1 b. x/ c5 }, ^* dcapable of coping with the huge amount of data while " @: {2 N' ^) w i8 h
remaining reliable. A potential solution is the FPGA based 5 H/ A- V' l1 x7 A# D T* C
edge computing, which is a powerful combination offering
. I$ @$ ^+ H. jFPGA acceleration capabilities together with edge and fog ) K# v1 x# V6 C# ^9 l0 I
benefits. Indeed, our work focusses on devising an Intrusion * X/ w# P* e' a% z7 @
Prevention architecture called FORTISEC (40SEC), that is & i% u% g) J& M8 c3 ]+ H* y
meant to operate in a completely softwarized as well as in an
* g: M6 ]2 ?- W0 ^0 v* V( |FPGA mode. Thereby, we present suitable algorithms, design 6 U0 V0 _/ ?# R1 X% q# \# C% b/ A! [
principles and well defined components towards the - O! N; ?% ]8 m! A3 y" t" q8 @" t
implementation of accelerated intrusion prevention on the 9 C7 o7 I4 j$ O/ T1 I
edge. We also present a testbed being utilized for the
0 r3 j' e: q" q: Simplementation of 40SEC and its performance testing.
4 d; c" R( r* e, a: ~# E6 _% Z Z
2 d" h, w a% [4 L
. c. {2 A* f! H+ D |