12MQ1D5706

download 12MQ1D5706

of 17

Transcript of 12MQ1D5706

  • 8/13/2019 12MQ1D5706

    1/17

    Under The Guidance of

    Mr. D.Sridhar M.Tech,Assistant Professor in SVIET.

    Presented

    by

    M.Siva Ram Prasad12MQ1D5706

    VLSI & SD

    A Scalable High Performance Virus-Detection

    Processor Against a Large Pattern Set forEmbedded Network Security

  • 8/13/2019 12MQ1D5706

    2/17

    CONTENTS

    Introduction

    Aim

    Abstract

    Algorithm

    Block Diagram

    Tools

    Comparison

    Advantages

    Applications Conclusion

    References

  • 8/13/2019 12MQ1D5706

    3/17

    AIM

    Network security has always been an important issue and its

    application is ready to perform powerful pattern matching to

    protect against virus attacks, spam and Trojan horses.

    The goal is to provide a systematic virus detection hardware

    solution for network security for embedded systems. Instead of

    placing entire matching patterns on a chip, our solution is

    based on an antivirus processor that works as much of the

    filtering information as possible onto a chip

  • 8/13/2019 12MQ1D5706

    4/17

    ABSTRACT

    In this project proposed to achieve a high-throughput, low-

    power, and low-cost virus-detection processor for mobile

    devices. The proposed virus detection processor is realized

    with the dual-port AND-type match-line scheme which is

    composed of dual-port dynamic AND gates. The dual-port

    designs reduce power consumption and increase storage

    efficiency due to shared storage spaces.

  • 8/13/2019 12MQ1D5706

    5/17

    VIRUS

    A virusis a computer program that can copy itself and infect a

    computer. The term "virus" is also commonly but erroneously

    used to refer to other types of malware, including but notlimited to adware and spyware programs that do not have the

    reproductive ability. A true virus can spread from one

    computer to another (in some form of executable code)

  • 8/13/2019 12MQ1D5706

    6/17

    VIRUS DETECTION PROCESSOR SHOULD

    HAVE

    1) The system throughput should reach up to 1 Gbps for supporting real-time

    virus detection in mobile devices adopting 4G wireless systems.

    2) The scalability of handling more than ten thousands patterns is required for

    versatile network protection. In addition, the system must be highly flexible

    to accommodate the rapidly increasing new virus patterns.

    3) Power consumption is the most important design consideration for mobile

    devices.

  • 8/13/2019 12MQ1D5706

    7/17

    EXISTING SYSTEM

    Aho and Corasicks algorithm (AC), which introduces a linear-time

    algorithm for multi-pattern search with a large finitestatema-chine.

    In contrast, heuristic approaches are based on the Boyer- Moore algorithm,

    which was introduced in 1977. Its key feature is the shift value,which shifts

    the algorithmssearch window formultiple characters when it encounters a

    mismatch.

  • 8/13/2019 12MQ1D5706

    8/17

    BLOOM ALGORITHM

    SHIFT -SIGN SIGNATURE ALOGRITHAM

    Wu-Manber algorithms and have even developed for

    specialized circuits to increase the scanning speed

    USED ALGORITHM

  • 8/13/2019 12MQ1D5706

    9/17

    BLOCK DIAGRAM

  • 8/13/2019 12MQ1D5706

    10/17

    Tools

    Xilinx ISE 14.3

    VHDL

  • 8/13/2019 12MQ1D5706

    11/17

    COMPARISON TABLE

    Quantity Existing work Proposed work

    Maximum Frequency 126.861MHz 534.334MHz

    Minimum period 5.310ns 5.310ns

    Number of sliceregisters

    14752 777

    Number used as Flip

    Flops

    29504 770

    Number of 4 input

    LUTs

    29504 1216

    Peak memory usage 227028KB 227264KB

    Number of bonded

    IOBs

    376 263

  • 8/13/2019 12MQ1D5706

    12/17

    ADVANTAGES

    high-throughput

    low-power

    low-cost

  • 8/13/2019 12MQ1D5706

    13/17

    DIS-ADVANTAGES

    . In this project we are dealing with three states(1 0

    and X).

    . Dealing with that dont care is advantage, but to

    define that dontcare is somehow difficult.

  • 8/13/2019 12MQ1D5706

    14/17

    APPLICATIONS

    In wireless devices like Bluetooth, Infrared rays

    communication.

    Our project can be applied to personnel computers

    also.

  • 8/13/2019 12MQ1D5706

    15/17

    CONCLUSION

    Many previous designs have claimed to provide high performance, but the

    memory gap created by using external memory decreases performance

    because of the increasing size of virus databases.

    Furthermore, limited resources restrict the practicality of these algorithms

    for embedded network security systems. Two-phase heuristic algorithms

    are a solution with a tradeoff between performance and cost due to an

    efficient filter table existing in internal memory; however, their

    performance is easily threatened by malicious attacks.

  • 8/13/2019 12MQ1D5706

    16/17

    REFERENCES

    K. J. Lin and C. W. Wu, A low-power CAM design for LZ data compression,IEEE Trans.

    Comput., vol. 49, no. 10, pp. 11391145, 2000.

    T. Ikenaga and T. Ogura, A fully parallel 1-MbCAMLSI for real-time pixel-parallel image

    processing, IEEE J.Solid-State Circuits, vol. 35, no. 4, pp. 536544, 2000

    N. F. Huang, W. E. Chen, J. Y. Luo, and J. M. Chen, Design of multifield IPv6 packet classifiers

    using ternary CAMs, in Proc. IEEE Int. Conf. Global Telecommunications, 2001, vol. 3, pp.

    18771881.

    Y. H. Cho and W. H. Mangione-Smith, A pattern matching coprocessor for network security,

    in Proc. IEEE 2005 Int. Conf. Design Automation,pp. 234239.

    L. Tan and T. Sherwood, A high throughput string matching architecture for intrusion

    detection and prevention, in Proc. IEEE Int. Symp. Computer Architecture, 2005, pp. 112

    122.

    M. Yadav, A. Venkatachaliah, and P. D. Franzon, Hardware architecture of a

    parallel pattern matching engine, in Proc. IEEE Int. Symp. Circuits and Systems,

    2007, pp. 13691372.

  • 8/13/2019 12MQ1D5706

    17/17

    THANK YOU