Affiliation:
1. The Johns Hopkins University Information Security Institute, Laurel, Maryland
2. Vanderbilt University, Nashville, TN
3. Georgia Institute of Technology, Atlanta, GA
Abstract
In this article, we illustrate that the boundary of a general-purpose node can be extended into the network by extracting information from network traffic generated by that general-purpose node to infer the state of its hardware components. This information is represented in a
delay signature
latent within the network traffic. In contrast, the traditional approach to determine the internal state of a node’s resources meant that a software application with internal processes had to be resident on the node. The aforementioned delay signature is the keystone that provides a correlation between network traffic and the internal state of the source node. We characterize this delay signature by (1) identifying the different types of assembly language instructions that source this delay and (2) describing how architectural techniques, such as instruction pipelining and caching, give rise to this delay signature. In theory, highly utilized nodes (due to multiple threads) will contain excessive context switching and contention for shared resources. One important shared resource is main memory, and excessive use of this resource by applications and internal processes eventually leads to a decrease in cache efficiency that eventually stalls the instruction pipeline. Our results support this theory; specifically, we have observed that excessive context switching in active applications increases the effective memory access time and wastes precious CPU cycles, thus adding additional delay to the execution of load, store, and other instructions. Because the operating system (OS) kernel accesses memory to send network packets, the delay signature is induced into network traffic in situations where user-level utilization is high. We demonstrate this theory in two case studies: (1) resource discovery in cluster grids and (2) network-based detection of bitcoin mining on compromised nodes.
Publisher
Association for Computing Machinery (ACM)
Subject
Hardware and Architecture,Software
Reference50 articles.
1. Aeroflex Gaisler. 2011. Homepage. Retrieved November 1 2011 from http://www.gaisler.com. Aeroflex Gaisler. 2011. Homepage. Retrieved November 1 2011 from http://www.gaisler.com.
2. Bitcoin Forum. 2011. Homepage. Retrieved November 1 2011 from https://bitcointalk.org/index.php?topic=7219.0. Bitcoin Forum. 2011. Homepage. Retrieved November 1 2011 from https://bitcointalk.org/index.php?topic=7219.0.
3. BitcoinCZ. 2011. Homepage. Retrieved November 1 2011 from http://mining.bitcoin.cz. BitcoinCZ. 2011. Homepage. Retrieved November 1 2011 from http://mining.bitcoin.cz.
4. C. Benvenuti. 2005. Understanding Linux Network Internals. O’Reilly Publishers Sebastopol CA. C. Benvenuti. 2005. Understanding Linux Network Internals. O’Reilly Publishers Sebastopol CA.
5. Performance analysis of system overheads in TCP/IP workloads
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献