TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Achieving 100Gbps intrusion prevention on a single server (2020)

92 pointsby harporoederover 2 years ago

8 comments

egberts1over 2 years ago
&quot;The slow path can’t take advantage of constant time operations, but fortunately is less often used as most packets arrive in order. It’s also used when inserting new flows.&quot;<p>Going to be in a world of hurt once a slow-path DDoS packets come rolling in.
评论 #33579040 未加载
评论 #33578984 未加载
评论 #33580846 未加载
wastedimageover 2 years ago
This is a cool idea like the potato powered clock. There are so many holes here. Let me just pick one. They don&#x27;t seem to account for reassembly issues which is a huge problem and vastly multiplies your problem space depending on how you implement the solution. What the fuck am I going on about you ask?<p>Think of it like this: sig: abc Traffic a[1] b[2] c[3]<p>where the packets are properly ordered in 1 2 3 order. Simple fragmentation could be sending them out of order - I believe this paper accounts for that. What if instead you send a[1] b[2] b[2] c[3]? Windows assembles this one way (depending on the version), linux another, bsd another. It&#x27;s super fun. Then what if you send c[3] b[2] c[3] a[1] b[2]. One could argue, &quot;hey d*ckhead we&#x27;re going to normalize the traffic first&quot; the problem is what is normal? Stevens had tons of good work on this. Some systems have a &#x27;normalization&#x27; standard that&#x27;s similar to how their network gear works. Also I find the fact that they say &#x27;all the patterns&#x27; must be matched for the sig to fire. Does that include an or? Are they breaking the or down into sub detectors or something? The 10,000 signature thing is also kind of fake as the number of signatures constantly grows like the number of amazing taylor swift songs.<p>All in all these authors need to go read the old breakingpoint test standards, or ixia, or nss, or really anyone.
评论 #33579702 未加载
评论 #33579457 未加载
评论 #33584052 未加载
throw0101cover 2 years ago
For multi-server situations, using Arista&#x27;s Tap Aggregation (TapAgg) architecture is a popular solution for splitting up network packets after doing a optical fibre tap on the network connection:<p>* <a href="https:&#x2F;&#x2F;www.arista.com&#x2F;en&#x2F;solutions&#x2F;tap-aggregation-with-danz" rel="nofollow">https:&#x2F;&#x2F;www.arista.com&#x2F;en&#x2F;solutions&#x2F;tap-aggregation-with-dan...</a><p>The hosts would run software like Suricata, which is multi-threaded, and so can take advantage of many cores. (Until recently (3.0?) Snort was single-threaded.)
dangover 2 years ago
Discussed at the time:<p><i>Achieving 100Gbps intrusion prevention on a single server</i> - <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=25108392" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=25108392</a> - Nov 2020 (35 comments)
hsbauauvhabzbover 2 years ago
I’m yet to see a signature matching system with defaults which are actually good. Don’t get me wrong, the ability to add regex filters are infinitely valuable for custom or emergency mitigations, but I think largely current systems blocking heuristics which look like attacks aren’t solving much.<p>That being said, I’m interested to see anomaly detection engines that learn data patterns and flag potentially malicious traffic.
评论 #33579593 未加载
EricEover 2 years ago
General purpose CPUs seem to have peaked - purpose built hardware is definitely on the rise. It worked well for GPUs (FPUs used to be external too) so I guess it shouldn&#x27;t be a surprise. Mainframe on the desktop!
xwowsersxover 2 years ago
Direct link to the PDF <a href="https:&#x2F;&#x2F;www.usenix.org&#x2F;system&#x2F;files&#x2F;osdi20-zhao_zhipeng.pdf" rel="nofollow">https:&#x2F;&#x2F;www.usenix.org&#x2F;system&#x2F;files&#x2F;osdi20-zhao_zhipeng.pdf</a> (not suggesting skipping the intro post as it had some good context&#x2F;color)
defrostover 2 years ago
For completeness, this is a (very good) November 2020 (two years ago) write up on a paper [1] with a video presentation (19 minutes) [2].<p>[1] <a href="https:&#x2F;&#x2F;www.usenix.org&#x2F;system&#x2F;files&#x2F;osdi20-zhao_zhipeng.pdf" rel="nofollow">https:&#x2F;&#x2F;www.usenix.org&#x2F;system&#x2F;files&#x2F;osdi20-zhao_zhipeng.pdf</a><p>[2] <a href="https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=KCUCUMNPMl0" rel="nofollow">https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=KCUCUMNPMl0</a>