SlideShare ist ein Scribd-Unternehmen logo
1 von 12
2013
Third Ph.D year

Matteo Avalle

New Techniques to Improve Network Security
Annual Oral Presentation for Ph.D Evaluation
Tutor: R. Sisto
Outline
• Motivations
• Speeding up data analysis
– Improving Regexp-based packet processing
– Distributed analysis approaches
– Results

• Simplifying security protocol design with
formal methods
– The JavaSPI framework
– Results

2/11
Motivations
• Developing a security protocol is a
difficult, error-prone task.
• Finding and fixing vulnerabilities is
complex, but not impossible:
– During protocol design, formal methods can
prove/disprove security properties
• (if you are an expert of the field)

– After deployment, traffic analysis can be useful
to block malicious behaviors
• (if you can afford to buy analyzers)

3/11
Speeding up data analysis
• As special-purpose devices are
expensive, research focused on speeding up
analysis by efficiently using general purpose
devices:
– Speeding up iNFAnt (tool for the analysis
through regex-based string matching in GPUs)
– Proposing a distributed analysis approach

4/11
Improving NFA speed: problems
• iNFAnt uses NFAs to represent rule sets.
• A technique called Multistride can transform
NFAs to make them n times faster to process
– The transformation is a slow process, with
current tools
– Obtaining 4x NFAs might require months of
processing. If the NFA is too complex, it might
not even be feasible

5/11
Improving NFA speed: solutions
• Faster algorithms have been developed, to “push
forward” Multistride limits.
• An alternative technique, called Multi-Map
Multistride has been developed
– It further pushes forward Multistride limits
– It enables iNFAnt to make a better use of the GPU
Results:
up to 4x higher throughput on medium-sized NFAs
up to 3x improvement on big rule sets that could not
be speeded up at all by previous tools

6/11
Distributed analysis approach
• Using several devices can increase maximum
analysis throughput
• Why not re-using already available
devices, like devices under analysis, to process
data?
– Smart re-use of existing resources
– More information can be extracted from data
– Network traffic overhead due to analysis is
contained
– BUT: devices must not be overloaded 7/11
Distributed analysis approach
• Results: the DELTA Framework
– It allows to re-write data analysis algorithms as
graph of interconnected stream processing
blocks
– Blocks are automatically moved across the
devices in the network
• Maximizes the amount of extracted information
• Minimizes workloads and network bandwidth usage

8/11
Results
• Development of enhanced Multistride tool sets
– M. Avalle, F. Risso, R. Sisto, “Efficient Multistriding of Large Nondeterministic Finite State Automata for Deep Packet
Inspection”, in Proc. of the IEEE International Conference on
Communications (ICC) 2012 – Communication and Information
Systems Security Symposium

• Development of Multi-Map Multi-stride
– M. Avalle, F. Risso, R. Sisto, “Enhanced Algorithms for NFA MultiStriding and NFA-Based Deep Packet Inspection on
GPUs”, submitted to IEEE/ACM Transactions of Networking, 2013

• Development of the DELTA framework
– M. Avalle, F. Risso, H. Song, M. Baldi, R. Sisto, “Pushing Network
Analytics Toward the Edge of the Network”, to be submitted

9/11
MDD with JavaSPI
• Formal Methods can be the key to prove
robustness of security protocols to certain
types of attacks, but using them is still hard.
• JavaSPI proposes to use Java as modeling
language
Model
Formal
verifier
Java security
protocol abstract
model

JavaSPI
Framework

proofs

Java concrete
implementation

10/11
Results
• Development of the JavaSPI framework
• Development of the SSL 3.0 handshake protocol as case study
– M. Avalle, A. Pironti, R. Sisto, D. Pozza, “The Java SPI Framework for Security
Protocol Implementation”, in Proc. of the Sixth International Conference on
Availability, Reliability and Security (ARES), Vienna, Austria, pp. 746-751, IEEE,
2011.
– M. Avalle, A. Pironti, D. Pozza, R. Sisto “JavaSPI: A Framework for Security
Protocol Implementation”. International Journal of Secure Software
Engineering (IJSSE), 2(4), 34-48, 2011.

• Development of mathematical proofs about JavaSPI soundness (proving
that results obtained starting from the model are applicable to the
implementation as well)
– (paper under preparation)

• Published a survey about formal verification of security protocol
implementations
– M. Avalle, A. Pironti, R. Sisto, “Formal Verification of Security Protocol
Implementations: A Survey”, Formal Aspects of Computing (FAoC), Springer,
pp. 1-25, 2013.

11/11
Questions?

Thanks for the attention!

Weitere ähnliche Inhalte

Andere mochten auch

3 seminar reflection wordpress
3 seminar reflection wordpress3 seminar reflection wordpress
3 seminar reflection wordpressyanielisrodriguez
 
Clilunit eso3 technologies telecommunication technology
Clilunit eso3 technologies telecommunication technologyClilunit eso3 technologies telecommunication technology
Clilunit eso3 technologies telecommunication technologyaabavil
 
Entorno económico global
Entorno económico globalEntorno económico global
Entorno económico globalSandra Garrote
 
Formación en salud y seguridad industrial llave en mano
Formación en salud y seguridad industrial llave en manoFormación en salud y seguridad industrial llave en mano
Formación en salud y seguridad industrial llave en manoFrancisco Berrizbeitia
 
Apresentação ori
Apresentação oriApresentação ori
Apresentação oriOri Jsd
 
Carga e análise dos resultados
Carga e análise dos resultadosCarga e análise dos resultados
Carga e análise dos resultadosanasanj
 
Salcedillo
SalcedilloSalcedillo
Salcedillocarreje
 
Stone Ward 30 in 30 November 2013
Stone Ward 30 in 30 November 2013Stone Ward 30 in 30 November 2013
Stone Ward 30 in 30 November 2013Emily Reeves Dean
 
New Realm of Adult Learning Comprised by B. Mosby
New Realm of Adult Learning Comprised by B. Mosby New Realm of Adult Learning Comprised by B. Mosby
New Realm of Adult Learning Comprised by B. Mosby bdmosby08
 
La constitución
La constituciónLa constitución
La constituciónjaimemil
 
El nacionalismo en el siglo xix
El nacionalismo en el siglo xixEl nacionalismo en el siglo xix
El nacionalismo en el siglo xixJOSE JAEN
 
Indicadores essenciais para monitorar ações em mídia social: Engajamento
Indicadores essenciais para monitorar ações em mídia social: EngajamentoIndicadores essenciais para monitorar ações em mídia social: Engajamento
Indicadores essenciais para monitorar ações em mídia social: EngajamentoLeonardo Seabra
 
2 seminar reflection wordpress
2 seminar reflection wordpress2 seminar reflection wordpress
2 seminar reflection wordpressyanielisrodriguez
 
Arp security by_abdimuna_sep_28
Arp security by_abdimuna_sep_28Arp security by_abdimuna_sep_28
Arp security by_abdimuna_sep_28Abdimuna Muna
 
Bioma de la puna (nico)
Bioma de la puna (nico)Bioma de la puna (nico)
Bioma de la puna (nico)Myr
 

Andere mochten auch (20)

Códice maya jul
Códice maya julCódice maya jul
Códice maya jul
 
India
IndiaIndia
India
 
3 seminar reflection wordpress
3 seminar reflection wordpress3 seminar reflection wordpress
3 seminar reflection wordpress
 
Clilunit eso3 technologies telecommunication technology
Clilunit eso3 technologies telecommunication technologyClilunit eso3 technologies telecommunication technology
Clilunit eso3 technologies telecommunication technology
 
Entorno económico global
Entorno económico globalEntorno económico global
Entorno económico global
 
Formación en salud y seguridad industrial llave en mano
Formación en salud y seguridad industrial llave en manoFormación en salud y seguridad industrial llave en mano
Formación en salud y seguridad industrial llave en mano
 
Apresentação ori
Apresentação oriApresentação ori
Apresentação ori
 
T3CON13DE TYPO3 Neos UX
T3CON13DE TYPO3 Neos UXT3CON13DE TYPO3 Neos UX
T3CON13DE TYPO3 Neos UX
 
Carga e análise dos resultados
Carga e análise dos resultadosCarga e análise dos resultados
Carga e análise dos resultados
 
Examen Mental Psiquiatrico
Examen Mental PsiquiatricoExamen Mental Psiquiatrico
Examen Mental Psiquiatrico
 
Biography project
Biography projectBiography project
Biography project
 
Salcedillo
SalcedilloSalcedillo
Salcedillo
 
Stone Ward 30 in 30 November 2013
Stone Ward 30 in 30 November 2013Stone Ward 30 in 30 November 2013
Stone Ward 30 in 30 November 2013
 
New Realm of Adult Learning Comprised by B. Mosby
New Realm of Adult Learning Comprised by B. Mosby New Realm of Adult Learning Comprised by B. Mosby
New Realm of Adult Learning Comprised by B. Mosby
 
La constitución
La constituciónLa constitución
La constitución
 
El nacionalismo en el siglo xix
El nacionalismo en el siglo xixEl nacionalismo en el siglo xix
El nacionalismo en el siglo xix
 
Indicadores essenciais para monitorar ações em mídia social: Engajamento
Indicadores essenciais para monitorar ações em mídia social: EngajamentoIndicadores essenciais para monitorar ações em mídia social: Engajamento
Indicadores essenciais para monitorar ações em mídia social: Engajamento
 
2 seminar reflection wordpress
2 seminar reflection wordpress2 seminar reflection wordpress
2 seminar reflection wordpress
 
Arp security by_abdimuna_sep_28
Arp security by_abdimuna_sep_28Arp security by_abdimuna_sep_28
Arp security by_abdimuna_sep_28
 
Bioma de la puna (nico)
Bioma de la puna (nico)Bioma de la puna (nico)
Bioma de la puna (nico)
 

Ähnlich wie Ph.D Annual Report III

Ph.D Annual report II
Ph.D Annual report IIPh.D Annual report II
Ph.D Annual report IIMatteo Avalle
 
The Overview of Discovery and Reconciliation of LTE Network
The Overview of Discovery and Reconciliation of LTE NetworkThe Overview of Discovery and Reconciliation of LTE Network
The Overview of Discovery and Reconciliation of LTE NetworkIRJET Journal
 
DEH-DoSv6: A defendable security model against IPv6 extension headers denial ...
DEH-DoSv6: A defendable security model against IPv6 extension headers denial ...DEH-DoSv6: A defendable security model against IPv6 extension headers denial ...
DEH-DoSv6: A defendable security model against IPv6 extension headers denial ...journalBEEI
 
Imperative Induced Innovation - Patrick W. Dowd, Ph. D
Imperative Induced Innovation - Patrick W. Dowd, Ph. DImperative Induced Innovation - Patrick W. Dowd, Ph. D
Imperative Induced Innovation - Patrick W. Dowd, Ph. Dscoopnewsgroup
 
IPv4 to IPv6 network transformation
IPv4 to IPv6 network transformationIPv4 to IPv6 network transformation
IPv4 to IPv6 network transformationNikolay Milovanov
 
OSNF - Open Sensor Network Framework
OSNF - Open Sensor Network FrameworkOSNF - Open Sensor Network Framework
OSNF - Open Sensor Network FrameworkAntonio Di Cello
 
An Ad-hoc Smart Gateway Platform for the Web of Things (IEEE iThings 2013 Bes...
An Ad-hoc Smart Gateway Platform for the Web of Things (IEEE iThings 2013 Bes...An Ad-hoc Smart Gateway Platform for the Web of Things (IEEE iThings 2013 Bes...
An Ad-hoc Smart Gateway Platform for the Web of Things (IEEE iThings 2013 Bes...Darren Carlson
 
The Pacific Research Platform
The Pacific Research PlatformThe Pacific Research Platform
The Pacific Research PlatformLarry Smarr
 
Virtual research environments for implementing long tail open science
Virtual research environments for implementing long tail open scienceVirtual research environments for implementing long tail open science
Virtual research environments for implementing long tail open scienceBlue BRIDGE
 
SRv6 experience for italy iPv6 council
SRv6 experience for italy iPv6 councilSRv6 experience for italy iPv6 council
SRv6 experience for italy iPv6 councilStefano Salsano
 
Big Data, Beyond the Data Center
Big Data, Beyond the Data CenterBig Data, Beyond the Data Center
Big Data, Beyond the Data CenterGilles Fedak
 
HEC Project Proposal_v1.0
HEC Project Proposal_v1.0HEC Project Proposal_v1.0
HEC Project Proposal_v1.0Awais Shibli
 
On SDN Research Topics - Christian Esteve Rothenberg
On SDN Research Topics - Christian Esteve RothenbergOn SDN Research Topics - Christian Esteve Rothenberg
On SDN Research Topics - Christian Esteve RothenbergCPqD
 
Sentinel Lessons Learned
Sentinel Lessons LearnedSentinel Lessons Learned
Sentinel Lessons LearnedH4Diadmin
 
Sentinel Lessons Learned H4D Stanford 2016
Sentinel Lessons Learned H4D Stanford 2016Sentinel Lessons Learned H4D Stanford 2016
Sentinel Lessons Learned H4D Stanford 2016Stanford University
 
Design and Implement Security Operat.docx
Design and Implement Security Operat.docxDesign and Implement Security Operat.docx
Design and Implement Security Operat.docxtheodorelove43763
 

Ähnlich wie Ph.D Annual Report III (20)

2017 dagstuhl-nfv-rothenberg
2017 dagstuhl-nfv-rothenberg2017 dagstuhl-nfv-rothenberg
2017 dagstuhl-nfv-rothenberg
 
Ph.D Annual report II
Ph.D Annual report IIPh.D Annual report II
Ph.D Annual report II
 
The Overview of Discovery and Reconciliation of LTE Network
The Overview of Discovery and Reconciliation of LTE NetworkThe Overview of Discovery and Reconciliation of LTE Network
The Overview of Discovery and Reconciliation of LTE Network
 
DEH-DoSv6: A defendable security model against IPv6 extension headers denial ...
DEH-DoSv6: A defendable security model against IPv6 extension headers denial ...DEH-DoSv6: A defendable security model against IPv6 extension headers denial ...
DEH-DoSv6: A defendable security model against IPv6 extension headers denial ...
 
Imperative Induced Innovation - Patrick W. Dowd, Ph. D
Imperative Induced Innovation - Patrick W. Dowd, Ph. DImperative Induced Innovation - Patrick W. Dowd, Ph. D
Imperative Induced Innovation - Patrick W. Dowd, Ph. D
 
2016 open-source-network-softwarization
2016 open-source-network-softwarization2016 open-source-network-softwarization
2016 open-source-network-softwarization
 
2016 open-source-network-softwarization
2016 open-source-network-softwarization2016 open-source-network-softwarization
2016 open-source-network-softwarization
 
IPv4 to IPv6 network transformation
IPv4 to IPv6 network transformationIPv4 to IPv6 network transformation
IPv4 to IPv6 network transformation
 
OSNF - Open Sensor Network Framework
OSNF - Open Sensor Network FrameworkOSNF - Open Sensor Network Framework
OSNF - Open Sensor Network Framework
 
An Ad-hoc Smart Gateway Platform for the Web of Things (IEEE iThings 2013 Bes...
An Ad-hoc Smart Gateway Platform for the Web of Things (IEEE iThings 2013 Bes...An Ad-hoc Smart Gateway Platform for the Web of Things (IEEE iThings 2013 Bes...
An Ad-hoc Smart Gateway Platform for the Web of Things (IEEE iThings 2013 Bes...
 
The Pacific Research Platform
The Pacific Research PlatformThe Pacific Research Platform
The Pacific Research Platform
 
Virtual research environments for implementing long tail open science
Virtual research environments for implementing long tail open scienceVirtual research environments for implementing long tail open science
Virtual research environments for implementing long tail open science
 
SRv6 experience for italy iPv6 council
SRv6 experience for italy iPv6 councilSRv6 experience for italy iPv6 council
SRv6 experience for italy iPv6 council
 
Big Data, Beyond the Data Center
Big Data, Beyond the Data CenterBig Data, Beyond the Data Center
Big Data, Beyond the Data Center
 
HEC Project Proposal_v1.0
HEC Project Proposal_v1.0HEC Project Proposal_v1.0
HEC Project Proposal_v1.0
 
Flow Monitoring Tools, What do we have, What do we need?
Flow Monitoring Tools, What do we have, What do we need?Flow Monitoring Tools, What do we have, What do we need?
Flow Monitoring Tools, What do we have, What do we need?
 
On SDN Research Topics - Christian Esteve Rothenberg
On SDN Research Topics - Christian Esteve RothenbergOn SDN Research Topics - Christian Esteve Rothenberg
On SDN Research Topics - Christian Esteve Rothenberg
 
Sentinel Lessons Learned
Sentinel Lessons LearnedSentinel Lessons Learned
Sentinel Lessons Learned
 
Sentinel Lessons Learned H4D Stanford 2016
Sentinel Lessons Learned H4D Stanford 2016Sentinel Lessons Learned H4D Stanford 2016
Sentinel Lessons Learned H4D Stanford 2016
 
Design and Implement Security Operat.docx
Design and Implement Security Operat.docxDesign and Implement Security Operat.docx
Design and Implement Security Operat.docx
 

Kürzlich hochgeladen

Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...Pooja Nehwal
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 

Kürzlich hochgeladen (20)

Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 

Ph.D Annual Report III

  • 1. 2013 Third Ph.D year Matteo Avalle New Techniques to Improve Network Security Annual Oral Presentation for Ph.D Evaluation Tutor: R. Sisto
  • 2. Outline • Motivations • Speeding up data analysis – Improving Regexp-based packet processing – Distributed analysis approaches – Results • Simplifying security protocol design with formal methods – The JavaSPI framework – Results 2/11
  • 3. Motivations • Developing a security protocol is a difficult, error-prone task. • Finding and fixing vulnerabilities is complex, but not impossible: – During protocol design, formal methods can prove/disprove security properties • (if you are an expert of the field) – After deployment, traffic analysis can be useful to block malicious behaviors • (if you can afford to buy analyzers) 3/11
  • 4. Speeding up data analysis • As special-purpose devices are expensive, research focused on speeding up analysis by efficiently using general purpose devices: – Speeding up iNFAnt (tool for the analysis through regex-based string matching in GPUs) – Proposing a distributed analysis approach 4/11
  • 5. Improving NFA speed: problems • iNFAnt uses NFAs to represent rule sets. • A technique called Multistride can transform NFAs to make them n times faster to process – The transformation is a slow process, with current tools – Obtaining 4x NFAs might require months of processing. If the NFA is too complex, it might not even be feasible 5/11
  • 6. Improving NFA speed: solutions • Faster algorithms have been developed, to “push forward” Multistride limits. • An alternative technique, called Multi-Map Multistride has been developed – It further pushes forward Multistride limits – It enables iNFAnt to make a better use of the GPU Results: up to 4x higher throughput on medium-sized NFAs up to 3x improvement on big rule sets that could not be speeded up at all by previous tools 6/11
  • 7. Distributed analysis approach • Using several devices can increase maximum analysis throughput • Why not re-using already available devices, like devices under analysis, to process data? – Smart re-use of existing resources – More information can be extracted from data – Network traffic overhead due to analysis is contained – BUT: devices must not be overloaded 7/11
  • 8. Distributed analysis approach • Results: the DELTA Framework – It allows to re-write data analysis algorithms as graph of interconnected stream processing blocks – Blocks are automatically moved across the devices in the network • Maximizes the amount of extracted information • Minimizes workloads and network bandwidth usage 8/11
  • 9. Results • Development of enhanced Multistride tool sets – M. Avalle, F. Risso, R. Sisto, “Efficient Multistriding of Large Nondeterministic Finite State Automata for Deep Packet Inspection”, in Proc. of the IEEE International Conference on Communications (ICC) 2012 – Communication and Information Systems Security Symposium • Development of Multi-Map Multi-stride – M. Avalle, F. Risso, R. Sisto, “Enhanced Algorithms for NFA MultiStriding and NFA-Based Deep Packet Inspection on GPUs”, submitted to IEEE/ACM Transactions of Networking, 2013 • Development of the DELTA framework – M. Avalle, F. Risso, H. Song, M. Baldi, R. Sisto, “Pushing Network Analytics Toward the Edge of the Network”, to be submitted 9/11
  • 10. MDD with JavaSPI • Formal Methods can be the key to prove robustness of security protocols to certain types of attacks, but using them is still hard. • JavaSPI proposes to use Java as modeling language Model Formal verifier Java security protocol abstract model JavaSPI Framework proofs Java concrete implementation 10/11
  • 11. Results • Development of the JavaSPI framework • Development of the SSL 3.0 handshake protocol as case study – M. Avalle, A. Pironti, R. Sisto, D. Pozza, “The Java SPI Framework for Security Protocol Implementation”, in Proc. of the Sixth International Conference on Availability, Reliability and Security (ARES), Vienna, Austria, pp. 746-751, IEEE, 2011. – M. Avalle, A. Pironti, D. Pozza, R. Sisto “JavaSPI: A Framework for Security Protocol Implementation”. International Journal of Secure Software Engineering (IJSSE), 2(4), 34-48, 2011. • Development of mathematical proofs about JavaSPI soundness (proving that results obtained starting from the model are applicable to the implementation as well) – (paper under preparation) • Published a survey about formal verification of security protocol implementations – M. Avalle, A. Pironti, R. Sisto, “Formal Verification of Security Protocol Implementations: A Survey”, Formal Aspects of Computing (FAoC), Springer, pp. 1-25, 2013. 11/11

Hinweis der Redaktion

  1. Hello to everybody, I’m MatteoAvalle and I’m here to perform my last annual Oral Presentation for Ph.D Evaluation.
  2. This presentation can be divided in three main sections: at first I will give you some insights about the motivations that led me to follow the research path I am going to describe, then I will delve more in detail about the two research directions I followed in these years; first I will discuss about my main research topic, regarding how to speed up data analysis and making its adoption cheaper than before, then I will talk about my secondary research topic, regarding how to make actual protocol design techniques, based on formal methods, more simple to perform and less error prone.
  3. The main reason that led me to choose these two research paths is that, quite curiously, even if it is not possible to give absolute guarantees abut the robustness of a network to a certain type of attacks, there already are several tools that can be of great help: for instance, thanks to the usage of formal methods, it is already possible to reassure customers about the security properties of a communication protocol with a very high level of confidence. On the other hand, after that communication protocols have been implemented, it is even possible to further increase the robustness of a network by using traffic analysis techniques to identify malicious behaviors.However, as you can read in this slide, both these solutions are often inapplicable, either because formal methods are a research branch that is still restricted to an extremely reduced amount of experts and because traffic analysis could be extremely expensive, especially when special purpose analyzers have to be used.Finding a solution to these two issues represented my main research focus, during the past three years.
  4. A much cheaper alternative to hardware analyzers is the use of software solutions on general purpose hardware. However, with the current techniques, using general purpose hardware creates several potential processing bandwidth issues: my main research topic regarded pushing forward these processing bandwidth limits by increasing the performance of iNFAnt, a regex-based packet processor that exploit the parallelism of GPUs. Then, in the last months, I focused more on taking advantage of another type of parallelism by distributing the data analysis workload to several devices. As it will be shown in few slides, this change of approach does not just improves performance but it also has a series of additional benefits.
  5. But let’s focus on iNFAnt, first: this tool uses NFAs, nondeterministic finite state automata, to represent rule sets. Thanks to this representation the packet processor can be implemented as a simple finite state machine, with the peculiarity that its processing speed can be increased by taking advantage of the high level of parallelism of modern GPUs. In order to further increase performance, a technique called Multistride can be used to transform NFAs and make them several times faster, at the cost of an higher automaton complexity. However, existing techniques were extremely slow and only applicable to very small and poor NFAs.
  6. For this reason, at the beginning of my Ph.D. course I focused on creating alternative, faster algorithms to push forward the maximum speedup achievable in reasonable times by Multistride optimization and, at the same time, to enable it to work on bigger automata (representing more complex rule sets).Then research focused on creating a different flavor of Multistride, called Multi-Map multistride, that not only pushes forward intrinsic limits of regular Multistride, by generating simpler automata after each iteration, but it also increases the degree of parallelism of the packet processing problem, thus allowing to use GPUs in a more efficient way.Using these techniques of reference rule sets allowed to experience the throughput increase you see at the bottom of this slide: medium-sized NFAs could be sped up up to 4 times more than by using previous techniques, while bigger rule sets that could not be used with previous multistride techniques can now be sped up up to 3 times.
  7. An alternative approach to the processing throughput limits is to simply increase the amount of devices involved. However, buying new devices can be expensive, while relying on data centers might generate additional issues. For instance, how much does it cost to send all the data that have to be analyzed to a remote data center?Aware of these issues we posed ourselves this question: why can’t we re-use resources we already have at our disposal, before considering using additional hardware? We decided, then to study what could happen if part of the data analysis tasks could be performed on the same devices producing the network traffic.This simple change of approach provided several benefits, many more than a mere workload reduction: the first one regards the fact that thanks to the advantageous position in which data is analyzed, it is possible to extract more information about it. Moreover, as data is pre-processed before leaving devices, the network overhead necessary to send data to the analyzer is minimized. However, these advantages comes with a cost: since we are re-using existing devices, we must not overload them, otherwise we would be degrading the performance of services that were already running on these devices.
  8. As solving this problem might make algorithm development extremely complex we implemented a specific framework, called DELTA (Dynamically Evolving Lightweight Task Allocator): with this framework developers only have to define data analysis algorithms as an oriented graph of processing blocks, and the framework will automatically take care to duplicate, merge and move these blocks across all the devices in a network in order to balance workloads and maximize the amount of processing performed before sending data to the “central” processing unit that merges together all the processing results.
  9. As result of the described research projects a conference paper has been published, a journal paper has been submitted and it is under evaluation from IEEE/ACM Transactions of Networking, while a conference paper regarding the DELTA framework is under preparation and it is expected to be submitted by the end of November.
  10. Now let’s take a step back and let’s focus on my secondary research topic, regarding formal methods: as anticipated, with formal methods it is possible to mathematically prove robustness of a protocol from a certain type of attacks, thus making it a potentially invaluable tool in the hand of developers. However, its main flaw is that using formal methods is very complex: they usually need to define protocol models by using exotic modeling languages, and even running the tools to automatically produce security robustness proofs is not easy as it is necessary to perform the right questions to these tools: otherwise, their output is worse than useless.For this reason we decided to develop the JavaSPI framework: as you can see in this slide, its main purpose is to allow developers to define abstract protocol models by using a very known programming language, Java. After the model has been defined (and eventually compiled and debugged, as we are dealing with java code we have lots of possibilities to validate its proper functioning), the JavaSPI framework takes care to automate two of the most error-prone tasks: the generation of formal proofs and the generation of concrete, interoperable, implementation code of the defined protocol. Both these operations are performed semi-automatically, so that developers still have control over them, but the level of expertise required to perform these operation is way lowered if compared to equivalent existing formal methods tools.
  11. As a result of this three-year period of research in this field, the JavaSPI framework has been developed along with a case study regarding a particular configuration of the SSL 3.0 handshake protocol. This led to publish a conference paper to the ARES conference in Vienna and a further extended version of the same paper has been accepted by the IJSSE journal.Then, another paper has been prepared regarding mathematically proving the soundness of the JavaSPI framework. This means mathematically proving that security properties proven for the abstract protocol model are also applicable to the implementation code. We plan to submit this paper in the next months.Finally, a survey paper discussing about state of the art of formal methods has been accepted from the FAoC journal, this year.
  12. As expected future works, it is possible to say that all the three tools presented today have room for improvement: their functionality can be expanded, part of their algorithms could be revised and new solutions can be studied to further improve actual results.Moreover, for the DELTA Framework in particular, there are even more possible future works: its working principle, regarding a “smart” way to distribute workloads among devices, has several additional application fields, especially when combined with other research projects. For instance, this framework could be combined with the iNFAnt tool or even with some other research projects that are currently active at the polytecnic, like the FROG programmable router developed by I.Cerato and F.Risso
  13. ?