110 likes | 232 Views
Data analytics at line speed over controlled network. Team :Alpha Adroit Ankit Dwivedi Nitish Jain Puneeth Reddy Ritu Arora Vinit Melinamani. Problem Statement. DASHBOARD. ( Software based ) Data Analyzer. PKT1. Software based data analyzers Cannot achieve line speed
E N D
Data analytics at line speed over controlled network Team :Alpha Adroit AnkitDwivedi Nitish Jain Puneeth Reddy Ritu Arora VinitMelinamani
Problem Statement DASHBOARD (Software based) Data Analyzer PKT1 • Software based data analyzers • Cannot achieve line speed • Packet decoding overhead 1)Slow PKT1 PKT1 PKT2 PKT2 PKT2 2)Complex software and infrastructure
Application Gateway Router Subscribers/Consumer • Provides Organization with – • Malicious Activity/Distributed Attack Notification • Unauthorized Website Access • Traffic Monitoring and Distribution Data Analysis System
INFORMATION EXTRACTED!! MULTI CORE IMPLEMENTATION CORE 1 OUTPUT QUEUES FINISHED!! FINISHED!! IN FIFO P2 P1 Arbiter P2P Detection System Intrusion Detection System FINISHED!! P2 P2 P1 P1 FINISHED!! P2P Detection System Intrusion Detection System CORE 2 INFORMATION EXTRACTED!! P2
Hardware Accelerator – An Overview 1.Source IP 2.Destination IP 3.Pattern match 4.Detected Pattern - XXX Pattern Matcher P2P Hardware Accelerator: 1.Source IP Address 2. Authorized access 1.Source IP Address 2. Unauthorized access PKT PKT PATTERN MATCHING ENGINE PKT P2P DETECTION SYSTEM PKT PKT PKT
FLOW OF INSTRUCTIONS - SINGLE CORE DUAL THREAD PC1 PC2 CONTROL UNIT T1 T1 PC ADD $3,$2,$1 TA MUX BEQ TA,$3,$2 Z Z ZERO INST. MEMORY $2 SUM $1 SUM $2,$1 $3,$2 TA $3 REGISTER FILE DATA MEMORY ALU MUX MUX SUM $3 $2 TA,$3,$2 $3,$2,$1 MUX $3 $3 TA $3 TA TA SIGN EXT. THREAD SCHEDULER
SAMPLE Packet Flow Control Node (NetFPGA) Node 4 Node 3 Node5 Node 1 PKT
Dashboard Node1 Node4 Torrentz Threshold level Control Node Data(Kb) Node5 Node3 Node5 Network Topology
P2P Packet Flow PKT PKT Control Node(NetFPGA) Node3 Node4 Node5 PKT Node1
Node1 Node4 Dashboard Traffic Distribution Torrentz Threshold level Control Node Malicious Activity Data(Kb) Node 4 - 10.1.3.3 Pattern - XXXX Node 1 - 10.1.0.3 Pattern - YYYY Node5 Node3 Node 6 - 10.1.5.3 Pattern - ZZZZ Sequence – XXXX- YYYY- ZZZZ Distributed Attack Restricted Website Access Node5 Network Topology