1 / 11

Data analytics at line speed over controlled network

Data analytics at line speed over controlled network. Team :Alpha Adroit Ankit Dwivedi Nitish Jain Puneeth Reddy Ritu Arora Vinit Melinamani. Problem Statement. DASHBOARD. ( Software based ) Data Analyzer. PKT1. Software based data analyzers Cannot achieve line speed

dusan
Download Presentation

Data analytics at line speed over controlled network

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Data analytics at line speed over controlled network Team :Alpha Adroit AnkitDwivedi Nitish Jain Puneeth Reddy Ritu Arora VinitMelinamani

  2. Problem Statement DASHBOARD (Software based) Data Analyzer PKT1 • Software based data analyzers • Cannot achieve line speed • Packet decoding overhead 1)Slow PKT1 PKT1 PKT2 PKT2 PKT2 2)Complex software and infrastructure

  3. Application Gateway Router Subscribers/Consumer • Provides Organization with – • Malicious Activity/Distributed Attack Notification • Unauthorized Website Access • Traffic Monitoring and Distribution Data Analysis System

  4. INFORMATION EXTRACTED!! MULTI CORE IMPLEMENTATION CORE 1 OUTPUT QUEUES FINISHED!! FINISHED!! IN FIFO P2 P1 Arbiter P2P Detection System Intrusion Detection System FINISHED!! P2 P2 P1 P1 FINISHED!! P2P Detection System Intrusion Detection System CORE 2 INFORMATION EXTRACTED!! P2

  5. Hardware Accelerator – An Overview 1.Source IP 2.Destination IP 3.Pattern match 4.Detected Pattern - XXX Pattern Matcher P2P Hardware Accelerator: 1.Source IP Address 2. Authorized access 1.Source IP Address 2. Unauthorized access PKT PKT PATTERN MATCHING ENGINE PKT P2P DETECTION SYSTEM PKT PKT PKT

  6. FLOW OF INSTRUCTIONS - SINGLE CORE DUAL THREAD PC1 PC2 CONTROL UNIT T1 T1 PC ADD $3,$2,$1 TA MUX BEQ TA,$3,$2 Z Z ZERO INST. MEMORY $2 SUM $1 SUM $2,$1 $3,$2 TA $3 REGISTER FILE DATA MEMORY ALU MUX MUX SUM $3 $2 TA,$3,$2 $3,$2,$1 MUX $3 $3 TA $3 TA TA SIGN EXT. THREAD SCHEDULER

  7. SAMPLE Packet Flow Control Node (NetFPGA) Node 4 Node 3 Node5 Node 1 PKT

  8. Dashboard Node1 Node4 Torrentz Threshold level Control Node Data(Kb) Node5 Node3 Node5 Network Topology

  9. P2P Packet Flow PKT PKT Control Node(NetFPGA) Node3 Node4 Node5 PKT Node1

  10. Node1 Node4 Dashboard Traffic Distribution Torrentz Threshold level Control Node Malicious Activity Data(Kb) Node 4 - 10.1.3.3 Pattern - XXXX Node 1 - 10.1.0.3 Pattern - YYYY Node5 Node3 Node 6 - 10.1.5.3 Pattern - ZZZZ Sequence – XXXX- YYYY- ZZZZ Distributed Attack Restricted Website Access Node5 Network Topology

More Related