Securing the data path of next-generation router systems

  • Authors:
  • Tilman Wolf;Russell Tessier;Gayatri Prabhu

  • Affiliations:
  • Department of Electrical and Computer Engineering, University of Massachusetts, Amherst, MA, USA;Department of Electrical and Computer Engineering, University of Massachusetts, Amherst, MA, USA;Department of Electrical and Computer Engineering, University of Massachusetts, Amherst, MA, USA

  • Venue:
  • Computer Communications
  • Year:
  • 2011

Quantified Score

Hi-index 0.24

Visualization

Abstract

As the technology used to implement computer network infrastructure advances, networking resources are becoming more vulnerable to attack. Recent router designs are based on general-purpose programmable processors, which increase their potential vulnerability. To address this issue, a Secure Packet Processing platform has been developed that can flexibly protect emerging router systems. Both instruction-level operation of embedded processors and I/O operations of router ports are monitored to detect anomalous behavior. If such behavior is detected, a recovery system is invoked to restore the system into an operational state. Experimental results show that processor-based attacks can generally be determined by a processing monitor within a single instruction. I/O anomalies, including unexpected packet broadcast or delay, can be detected by an I/O monitor with limited overhead. Overall, the system overhead for secure monitoring is limited to a fraction of the overall system space, memory, and power budget.