簡易檢索 / 詳目顯示

研究生: 劉振雄
Liu, Chen-Hsiung
論文名稱: 以圖形處理器為基礎採用完美雜湊優化樣式比對記憶體架構
Optimization of Perfect Hashing for Memory-Efficient Pattern Matching Architectures on Graphic Processing Units
指導教授: 張世杰
Chang, Shih-Chieh
口試委員: 黃能富
Huang, Nen-Fu
林政宏
Lin, Cheng-Hung
學位類別: 碩士
Master
系所名稱: 電機資訊學院 - 資訊工程學系
Computer Science
論文出版年: 2011
畢業學年度: 99
語文別: 英文
論文頁數: 34
中文關鍵詞: 樣式比對圖形處理器完美雜湊CUDA
外文關鍵詞: Pattern Matching, GPU, Perfect Hashing, CUDA
相關次數: 點閱:2下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • Memory architectures have been widely adopted in network intrusion detection system for inspecting malicious packets due to their flexibility and scalability. Traditional memory architectures match input streams against thousands of attack patterns by traversing the corresponding state transition table stored in a two-dimensional memory. It’s well-known that using two-dimensional memory is time-efficient for retrieving next state information, but is extremely space-inefficient because most of memories are wasted.
    In this paper, we propose a novel memory architecture using perfect hashing to condense state transition tables without hash collisions. The proposed perfect hashing memory architecture achieves up to 99.5% of memory reduction compared to two-dimensional memory architectures. We have implemented the novel memory architecture on graphic processing units. The proposed architecture is tested using attack patterns from Snort V2.8 and input packets from DEFCON. The experimental results show that the proposed algorithm outperforms state-of-the-art memory architectures both on performance and memory efficiency.


    因為記憶體架構的靈活性與可擴展性,在網路威脅偵測系統中,廣泛的使用記憶體架構來檢驗惡意的封包。傳統的記憶體架構藉由traverse儲存在二維記憶體中的state transition table,比對輸入串流與數以千計的攻擊性pattern。眾所周知,使用二維記憶體架構來擷取next state的資訊相當快速,但是極度浪費空間,因為大部分的記憶體空間是沒有使用到的。
    在這篇論文中,我們提出了一個新的記憶體架構,採用perfect hashing來壓縮state transition tables,並且避免了hash collision的問題。我們提出的perfect hashing記憶體架構,相較於二維記憶體架構可以減少99.5%的記憶體使用。我們將此新的記憶體架構實作於圖形處理器,並且以Snort V2.8的攻擊pattern與DEFCOM的輸入封包來測試。實驗結果顯示,我們提出的新方法在效能及記憶體使用都優於其他最先進的記憶體架構。

    Abstract 5 List of Contents: 6 List of Figures: 7 List of Tables: 8 Chapter 1 Introduction 9 Chapter 2 Memory Condensing by Perfect Hashing 13 Chapter 3 A Novel Memory Architecture Using Perfect Hashing 16 Chapter 4 GPU Implementations and Optimization 21 4.1 Setting the width of the key table as power of two 26 4.2 Merging HK and NS tables 26 4.3 Binding perfect hash tables to texture memory 27 4.4 Accelerating data transmission between host and device 27 4.5 Asynchronous execution 28 Chapter 5 Experimental Results 30 Chapter 6 Conclusions 32 References 33

    [1] A. V. Aho and M. J. Corasick, "Efficient string matching: an aid to bibliographic search," Commun. ACM, vol. 18, pp. 333-340, 1975.
    [2] Z. J. Czech, G. Havas, B. S. Majewski, Perfect Hashing, Theoretical Computer Science, Volume 182 Issue 1-2, 1997.
    [3] C.-H. Lin, et al., "Accelerating String Matching Using Multi-Threaded Algorithm on GPU," in GLOBECOM 2010, 2010 IEEE Global Telecommunications Conference, 2010, pp. 1-5.
    [4] J. v. Lunteren, "High-Performance Pattern-Matching for Intrusion Detection", INFOCOM 2006. 25th IEEE International Conference on Computer Communications. Proceedings, On page(s): 1 - 13, Volume: Issue: , April 2006
    [5] M. Roesch. "Snort- lightweight Intrusion Detection for networks," in Proceedings of LISA99, the 15th Systems Administration Conference, 1999
    [6] T. Song, et al., "A Memory Efficient Multiple Pattern Matching Architecture for Network Security," in INFOCOM 2008. The 27th Conference on Computer Communications. IEEE, 2008, pp. 166-170.
    [7] L. Tan and T. Sherwood, "A high throughput string matching architecture for intrusion detection and prevention," in Computer Architecture, 2005. ISCA '05. Proceedings. 32nd International Symposium on, 2005, pp. 112-122.
    [8] N. Tuck, et al., "Deterministic memory-efficient string matching algorithms for intrusion detection," in INFOCOM 2004. Twenty-third Annual Joint Conference of the IEEE Computer and Communications Societies, 2004, pp. 2628-2639 vol.4.
    [9] DEFCON, Available: http://cctf.shmoo.com
    [10] NVIDIA Corporation. NVIDIA CUDA programming Guide, 2010 Available: http://developer.nvidia.com
    [11] PFAC library, Available: http://code.google.com/p/pfac/

    無法下載圖示 全文公開日期 本全文未授權公開 (校內網路)
    全文公開日期 本全文未授權公開 (校外網路)

    QR CODE