Welcome!

Log Management Authors: Dana Gardner, Pat Romanski, Elizabeth White, David H Deans, Carmen Gonzalez

News Feed Item

cPacket's 10 Gigabit cFlow Appliance Benefits High-Performance Network Intrusion Detection System at Lawrence Berkeley National Labs

1U Box Frontends First Scalable, Stateful NIDS on Commodity PC Cluster

cPacket Networks revealed today that their previously-unannounced cFlow appliance is serving as the load-balancing frontend to a powerful, high-speed network intrusion detection system (NIDS) implemented at Lawrence Berkeley National Laboratory (Berkeley Lab), that uses clusters of commodity hardware for analysis. The cFlow splits a heterogeneous packet stream of 10 gigabits per second into multiple, load-balanced subsets that meet specific criteria for example, all the interrelated packets of specific HTTP sessions and redirects each such subset to a different destination in the cluster.

In the Lawrence Berkeley National Laboratory intrusion detection system, each such subset is redirected to one of the inexpensive commodity PCs in a cluster, which performs security analysis using an open-source analysis engine. The PCs communicate with a management PC to provide the fine-grained correlation necessary for high-quality operational security. The system is inherently scalable, easy to maintain, and can be made extremely fault tolerant with simple hot backups.

The processing required to provide effective network intrusion detection for even a single gigabit traffic stream is far beyond the reach of single workstations, and its only getting worse, said Berkeley Lab spokesperson Robin Sommer, one of the co-architects of the system. We realized that just as large clusters of ordinary personal computers are routinely applied to solve computationally profound problems, a similar approach would work extremely well for intrusion detection. A key challenge, however, was to figure out how to balance the workload across the workstations in the cluster.

Berkeley Lab spokesperson Anne Hutton added that the Labs team experimented with several approaches for distributing the traffic, including pure software, and specialized hardware.

The software a Linux application worked, but didnt have the desired performance, said Hutton. A second approach, using a custom-programmed hardware appliance, allowed the team to validate the concept and publish the research findings [see endnotes for reference]. Ultimately, however, we collaborated with the cPacket team to develop the cFlow solution, which delivers a load balancing frontend at full 10G line rate and is more versatile and easier to use for flow load balancing than other approaches.

The cFlow hardware can be passively inserted like a bump in the wire into 10G links, said Rony Kay, president of cPacket. We partition the traffic workload to multiple target machines in the cluster, such that each machine can process a subset of the traffic independently. According to Kay, the cFlow features two 10G fiber ports for data in and data out, and an additional out-of-band management port.

Provisioning is easy, Kay added. The user can specify from a Web browser what traffic or protocols go to which target machines. Its that simple. And, if any machine in the cluster suddenly goes off line, it is easy to redirect the traffic to a designated hot standby, or to rebalance the traffic over the remaining active resources.

The cFlow is packaged in a 1U rack-mount enclosure. Its internal processing engine is based on a unique cPacket complete packet inspection chip that can deliver 100% header and payload inspection at line speeds of 20 gigabits per second.

In addition to applications like the network intrusion detection system described above, Kay reports that the cFlow easily supports a number of other use cases. For example, said Kay, users can implement high speed NetFlow probes for 10Gbps traffic by leveraging several commodity PCs without the need for specialized and expensive custom appliances. It can also be used in server farms for workload balancing over multiple server instances.

Similar to its other announced network hardware, cPacket conceives of the cFlow as a production reference design. For certain landmark customers such as Berkeley Labs high-profile NIDS project, the company will sell the box as a turnkey product. However, the bulk of the cFlow sales will be through cPackets OEM partners who will private label the product.

The network at the Lawrence Berkeley National Laboratory consists of several thousand users and hosts connected to the Internet via a 10 gigabit per second link. The cFlow acts as the front end to the NIDS, classifying the packets into related flows and forwarding them to a cluster of approximately ten 3.6GHz dual-CPU Intel Pentium D commodity PCs for analysis.

What the NIDS project team has achieved is extraordinary, concluded Kay. They have added a layer of flexible, scalable, and easily-maintained flow balancing to support the operational security of an extremely sensitive, but highly trafficked network with a minimum of complexity and cost. We are proud to play a key role.

The NIDS project team included researchers from Berkeley Lab, the International Computer Science Institute, and the Technical University Munich.

About cPacket

cPacket Networks is an emerging leader in chips and technologies that offers breakthrough, complete packet inspection at 10 gigabits per second or better, at a fraction of the complexity, power, or cost of preexisting approaches. It provides manufacturers of routers, switches and other network appliances a low-impact means to easily drop game-changing, wire-speed active network traffic analysis and response directly into their existing or planned designs whether targeted at the service providers, the enterprise, or the small office. cPacket supports both these manufacturers and the market with production-class reference designs such as the cTap and cFlow that can be deployed as is, licensed for private-label distribution, or provide OEMs with a complete proof of concept for their own industry-leading designs based upon cPacket chips.

The exploding use of networks for media-centric applications makes the availability of truly pervasive deep packet inspection timely and crucial.

cPacket was founded in 2003 and is located in Mountain View, CA. For more information, visit www.cpacket.com.

Editors, note: All trademarks and registered trademarks are those of their respective companies.

Additional background information is available at www.roeder-johnson.com.

See also: The NIDS Cluster: Scalable, Stateful Network Intrusion Detection on Commodity Hardware, M. Vallentin, R. Sommer, J. Lee, C. Leres, V. Paxson, and B. Tierney, Proceedings of RAID 2007.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

IoT & Smart Cities Stories
If a machine can invent, does this mean the end of the patent system as we know it? The patent system, both in the US and Europe, allows companies to protect their inventions and helps foster innovation. However, Artificial Intelligence (AI) could be set to disrupt the patent system as we know it. This talk will examine how AI may change the patent landscape in the years to come. Furthermore, ways in which companies can best protect their AI related inventions will be examined from both a US and...
Enterprises have taken advantage of IoT to achieve important revenue and cost advantages. What is less apparent is how incumbent enterprises operating at scale have, following success with IoT, built analytic, operations management and software development capabilities - ranging from autonomous vehicles to manageable robotics installations. They have embraced these capabilities as if they were Silicon Valley startups.
Dynatrace is an application performance management software company with products for the information technology departments and digital business owners of medium and large businesses. Building the Future of Monitoring with Artificial Intelligence. Today we can collect lots and lots of performance data. We build beautiful dashboards and even have fancy query languages to access and transform the data. Still performance data is a secret language only a couple of people understand. The more busine...
Chris Matthieu is the President & CEO of Computes, inc. He brings 30 years of experience in development and launches of disruptive technologies to create new market opportunities as well as enhance enterprise product portfolios with emerging technologies. His most recent venture was Octoblu, a cross-protocol Internet of Things (IoT) mesh network platform, acquired by Citrix. Prior to co-founding Octoblu, Chris was founder of Nodester, an open-source Node.JS PaaS which was acquired by AppFog and ...
The deluge of IoT sensor data collected from connected devices and the powerful AI required to make that data actionable are giving rise to a hybrid ecosystem in which cloud, on-prem and edge processes become interweaved. Attendees will learn how emerging composable infrastructure solutions deliver the adaptive architecture needed to manage this new data reality. Machine learning algorithms can better anticipate data storms and automate resources to support surges, including fully scalable GPU-c...
Cloud-enabled transformation has evolved from cost saving measure to business innovation strategy -- one that combines the cloud with cognitive capabilities to drive market disruption. Learn how you can achieve the insight and agility you need to gain a competitive advantage. Industry-acclaimed CTO and cloud expert, Shankar Kalyana presents. Only the most exceptional IBMers are appointed with the rare distinction of IBM Fellow, the highest technical honor in the company. Shankar has also receive...
Bill Schmarzo, author of "Big Data: Understanding How Data Powers Big Business" and "Big Data MBA: Driving Business Strategies with Data Science," is responsible for setting the strategy and defining the Big Data service offerings and capabilities for EMC Global Services Big Data Practice. As the CTO for the Big Data Practice, he is responsible for working with organizations to help them identify where and how to start their big data journeys. He's written several white papers, is an avid blogge...
The standardization of container runtimes and images has sparked the creation of an almost overwhelming number of new open source projects that build on and otherwise work with these specifications. Of course, there's Kubernetes, which orchestrates and manages collections of containers. It was one of the first and best-known examples of projects that make containers truly useful for production use. However, more recently, the container ecosystem has truly exploded. A service mesh like Istio addr...
Business professionals no longer wonder if they'll migrate to the cloud; it's now a matter of when. The cloud environment has proved to be a major force in transitioning to an agile business model that enables quick decisions and fast implementation that solidify customer relationships. And when the cloud is combined with the power of cognitive computing, it drives innovation and transformation that achieves astounding competitive advantage.
Whenever a new technology hits the high points of hype, everyone starts talking about it like it will solve all their business problems. Blockchain is one of those technologies. According to Gartner's latest report on the hype cycle of emerging technologies, blockchain has just passed the peak of their hype cycle curve. If you read the news articles about it, one would think it has taken over the technology world. No disruptive technology is without its challenges and potential impediments t...