Welcome!

Log Management Authors: Dana Gardner, Pat Romanski, Elizabeth White, David H Deans, Carmen Gonzalez

News Feed Item

cPacket's 10 Gigabit cFlow Appliance Benefits High-Performance Network Intrusion Detection System at Lawrence Berkeley National Labs

1U Box Frontends First Scalable, Stateful NIDS on Commodity PC Cluster

cPacket Networks revealed today that their previously-unannounced cFlow appliance is serving as the load-balancing frontend to a powerful, high-speed network intrusion detection system (NIDS) implemented at Lawrence Berkeley National Laboratory (Berkeley Lab), that uses clusters of commodity hardware for analysis. The cFlow splits a heterogeneous packet stream of 10 gigabits per second into multiple, load-balanced subsets that meet specific criteria for example, all the interrelated packets of specific HTTP sessions and redirects each such subset to a different destination in the cluster.

In the Lawrence Berkeley National Laboratory intrusion detection system, each such subset is redirected to one of the inexpensive commodity PCs in a cluster, which performs security analysis using an open-source analysis engine. The PCs communicate with a management PC to provide the fine-grained correlation necessary for high-quality operational security. The system is inherently scalable, easy to maintain, and can be made extremely fault tolerant with simple hot backups.

The processing required to provide effective network intrusion detection for even a single gigabit traffic stream is far beyond the reach of single workstations, and its only getting worse, said Berkeley Lab spokesperson Robin Sommer, one of the co-architects of the system. We realized that just as large clusters of ordinary personal computers are routinely applied to solve computationally profound problems, a similar approach would work extremely well for intrusion detection. A key challenge, however, was to figure out how to balance the workload across the workstations in the cluster.

Berkeley Lab spokesperson Anne Hutton added that the Labs team experimented with several approaches for distributing the traffic, including pure software, and specialized hardware.

The software a Linux application worked, but didnt have the desired performance, said Hutton. A second approach, using a custom-programmed hardware appliance, allowed the team to validate the concept and publish the research findings [see endnotes for reference]. Ultimately, however, we collaborated with the cPacket team to develop the cFlow solution, which delivers a load balancing frontend at full 10G line rate and is more versatile and easier to use for flow load balancing than other approaches.

The cFlow hardware can be passively inserted like a bump in the wire into 10G links, said Rony Kay, president of cPacket. We partition the traffic workload to multiple target machines in the cluster, such that each machine can process a subset of the traffic independently. According to Kay, the cFlow features two 10G fiber ports for data in and data out, and an additional out-of-band management port.

Provisioning is easy, Kay added. The user can specify from a Web browser what traffic or protocols go to which target machines. Its that simple. And, if any machine in the cluster suddenly goes off line, it is easy to redirect the traffic to a designated hot standby, or to rebalance the traffic over the remaining active resources.

The cFlow is packaged in a 1U rack-mount enclosure. Its internal processing engine is based on a unique cPacket complete packet inspection chip that can deliver 100% header and payload inspection at line speeds of 20 gigabits per second.

In addition to applications like the network intrusion detection system described above, Kay reports that the cFlow easily supports a number of other use cases. For example, said Kay, users can implement high speed NetFlow probes for 10Gbps traffic by leveraging several commodity PCs without the need for specialized and expensive custom appliances. It can also be used in server farms for workload balancing over multiple server instances.

Similar to its other announced network hardware, cPacket conceives of the cFlow as a production reference design. For certain landmark customers such as Berkeley Labs high-profile NIDS project, the company will sell the box as a turnkey product. However, the bulk of the cFlow sales will be through cPackets OEM partners who will private label the product.

The network at the Lawrence Berkeley National Laboratory consists of several thousand users and hosts connected to the Internet via a 10 gigabit per second link. The cFlow acts as the front end to the NIDS, classifying the packets into related flows and forwarding them to a cluster of approximately ten 3.6GHz dual-CPU Intel Pentium D commodity PCs for analysis.

What the NIDS project team has achieved is extraordinary, concluded Kay. They have added a layer of flexible, scalable, and easily-maintained flow balancing to support the operational security of an extremely sensitive, but highly trafficked network with a minimum of complexity and cost. We are proud to play a key role.

The NIDS project team included researchers from Berkeley Lab, the International Computer Science Institute, and the Technical University Munich.

About cPacket

cPacket Networks is an emerging leader in chips and technologies that offers breakthrough, complete packet inspection at 10 gigabits per second or better, at a fraction of the complexity, power, or cost of preexisting approaches. It provides manufacturers of routers, switches and other network appliances a low-impact means to easily drop game-changing, wire-speed active network traffic analysis and response directly into their existing or planned designs whether targeted at the service providers, the enterprise, or the small office. cPacket supports both these manufacturers and the market with production-class reference designs such as the cTap and cFlow that can be deployed as is, licensed for private-label distribution, or provide OEMs with a complete proof of concept for their own industry-leading designs based upon cPacket chips.

The exploding use of networks for media-centric applications makes the availability of truly pervasive deep packet inspection timely and crucial.

cPacket was founded in 2003 and is located in Mountain View, CA. For more information, visit www.cpacket.com.

Editors, note: All trademarks and registered trademarks are those of their respective companies.

Additional background information is available at www.roeder-johnson.com.

See also: The NIDS Cluster: Scalable, Stateful Network Intrusion Detection on Commodity Hardware, M. Vallentin, R. Sommer, J. Lee, C. Leres, V. Paxson, and B. Tierney, Proceedings of RAID 2007.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

IoT & Smart Cities Stories
Digital Transformation and Disruption, Amazon Style - What You Can Learn. Chris Kocher is a co-founder of Grey Heron, a management and strategic marketing consulting firm. He has 25+ years in both strategic and hands-on operating experience helping executives and investors build revenues and shareholder value. He has consulted with over 130 companies on innovating with new business models, product strategies and monetization. Chris has held management positions at HP and Symantec in addition to ...
Dynatrace is an application performance management software company with products for the information technology departments and digital business owners of medium and large businesses. Building the Future of Monitoring with Artificial Intelligence. Today we can collect lots and lots of performance data. We build beautiful dashboards and even have fancy query languages to access and transform the data. Still performance data is a secret language only a couple of people understand. The more busine...
The challenges of aggregating data from consumer-oriented devices, such as wearable technologies and smart thermostats, are fairly well-understood. However, there are a new set of challenges for IoT devices that generate megabytes or gigabytes of data per second. Certainly, the infrastructure will have to change, as those volumes of data will likely overwhelm the available bandwidth for aggregating the data into a central repository. Ochandarena discusses a whole new way to think about your next...
CloudEXPO | DevOpsSUMMIT | DXWorldEXPO are the world's most influential, independent events where Cloud Computing was coined and where technology buyers and vendors meet to experience and discuss the big picture of Digital Transformation and all of the strategies, tactics, and tools they need to realize their goals. Sponsors of DXWorldEXPO | CloudEXPO benefit from unmatched branding, profile building and lead generation opportunities.
All in Mobile is a place where we continually maximize their impact by fostering understanding, empathy, insights, creativity and joy. They believe that a truly useful and desirable mobile app doesn't need the brightest idea or the most advanced technology. A great product begins with understanding people. It's easy to think that customers will love your app, but can you justify it? They make sure your final app is something that users truly want and need. The only way to do this is by ...
DXWorldEXPO LLC announced today that Big Data Federation to Exhibit at the 22nd International CloudEXPO, colocated with DevOpsSUMMIT and DXWorldEXPO, November 12-13, 2018 in New York City. Big Data Federation, Inc. develops and applies artificial intelligence to predict financial and economic events that matter. The company uncovers patterns and precise drivers of performance and outcomes with the aid of machine-learning algorithms, big data, and fundamental analysis. Their products are deployed...
Cell networks have the advantage of long-range communications, reaching an estimated 90% of the world. But cell networks such as 2G, 3G and LTE consume lots of power and were designed for connecting people. They are not optimized for low- or battery-powered devices or for IoT applications with infrequently transmitted data. Cell IoT modules that support narrow-band IoT and 4G cell networks will enable cell connectivity, device management, and app enablement for low-power wide-area network IoT. B...
The hierarchical architecture that distributes "compute" within the network specially at the edge can enable new services by harnessing emerging technologies. But Edge-Compute comes at increased cost that needs to be managed and potentially augmented by creative architecture solutions as there will always a catching-up with the capacity demands. Processing power in smartphones has enhanced YoY and there is increasingly spare compute capacity that can be potentially pooled. Uber has successfully ...
SYS-CON Events announced today that CrowdReviews.com has been named “Media Sponsor” of SYS-CON's 22nd International Cloud Expo, which will take place on June 5–7, 2018, at the Javits Center in New York City, NY. CrowdReviews.com is a transparent online platform for determining which products and services are the best based on the opinion of the crowd. The crowd consists of Internet users that have experienced products and services first-hand and have an interest in letting other potential buye...
When talking IoT we often focus on the devices, the sensors, the hardware itself. The new smart appliances, the new smart or self-driving cars (which are amalgamations of many ‘things'). When we are looking at the world of IoT, we should take a step back, look at the big picture. What value are these devices providing. IoT is not about the devices, its about the data consumed and generated. The devices are tools, mechanisms, conduits. This paper discusses the considerations when dealing with the...