Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Real-Time Anomaly Detection Framework for Many-Core Router through Machine-Learning Techniques

Published: 16 June 2016 Publication History

Abstract

In this article, we propose a real-time anomaly detection framework for an NoC-based many-core architecture. We assume that processing cores and memories are safe and anomaly is included through a communication medium (i.e., router). The article targets three different attacks, namely, traffic diversion, route looping, and core address spoofing attacks. The attacks are detected by using machine-learning techniques. Comprehensive analysis on machine-learning algorithms suggests that Support Vector Machine (SVM) and K-Nearest Neighbor (K-NN) have better attack detection efficiency. It has been observed that both algorithms have accuracy in the range of 94% to 97%. Additional hardware complexity analysis advocates SVM to be implemented on hardware. To test the framework, we implement a condition-based attack insertion module; attacks are performed intra- and intercluster. The proposed real-time anomaly detection framework is fully placed and routed on Xilinx Virtex-7 FPGA. Postplace and -route implementation results show that SVM has 12% to 2% area overhead and 3% to 1% power overhead for the quad-core and 16-core implementation, respectively. It is also observed that it takes 25% to 18% of the total execution time to detect an anomaly in transferred packets for quad-core and 16-core, respectively. The proposed framework achieves 65% reduction in area overhead and is 3 times faster compared to previous published work.

References

[1]
M. Abramovici and P. Bradley. 2009. Integrated circuit security: New threats and solutions. In Proceedings of the 2009 5th Annual Workshop on Cyber Security and Information Intelligence Research.
[2]
A. Adamov, A. Saprykin, D. Melnik, and O. Lukashenko. 2009. The problem of hardware Trojans detection in system-on-chip. In Proceedings of the 10th International Conference - The Experience of Designing and Application of CAD Systems in Microelectronics, 2009 (CADSM’09). 178--179.
[3]
D. Agrawal, S. Baktir, D. Karakoyunlu, P. Rohatgi, and B. Sunar. 2007. Trojan detection using IC fingerprinting. In Proceedings of the 2007 IEEE Symposium on Security and Privacy (SP’07). Berkeley, CA, 296--310.
[4]
A. Almalawi, Z. Tari, A. Fahad, and I. Khalil. 2013. A framework for improving the accuracy of unsupervised intrusion detection for SCADA systems. In Proceedings of the 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom’13). 292--301.
[5]
D. Anguita, A. Ghio, S. Pischiutta, and S. Ridella. 2007. A hardware-friendly support vector machine for embedded automotive applications. In Proceedings of the International Joint Conference on Neural Networks, 2007 (IJCNN’07). 1360--1364.
[6]
G. Becker, F. Regazzoni, C. Paar, and W. Burleson. 2013. Stealthy dopant-level hardware Trojans. In Proceedings of the 2013 15th International Workshop on Cryptographic Hardware and Embedded Systems (CHES’13). 197--214.
[7]
S. Bhunia, M. Abramovici, D. Agrawal, P. Bradley, M. S. Hsiao, J. Plusquellic, and M. Tehranipoor. 2013. Protection against hardware Trojan attacks: Towards a comprehensive solution. IEEE Design Test 30, 3 (June 2013), 6--17.
[8]
J. Bisasky, H. Homayoun, F. Yazdani, and T. Mohsenin. 2013. A 64-core platform for biomedical signal processing. In Proceedings of the 2013 14th International Symposium on Quality Electronic Design (ISQED’13). 368--372.
[9]
D. Cao, J. Han, X. Zeng, and S. Lu. 2008. A core-based multi-function security processor with GALS wrapper. In Proceedings of the 9th International Conference on Solid-State and Integrated-Circuit Technology, 2008 (ICSICT’08). 1839--1842.
[10]
R. Chakraborty, F. Wolff, S. Paul, C. Papachristou, and S. Bhunia. 2009. MERO: A statistical approach for hardware Trojan detection. In Proceedings of the 11th International Workshop on Cryptographic Hardware and Embedded Systems (CHES’09). Springer-Verlag, Berlin, 396--410.
[11]
P. Cotret, J. Crenne, G. Gogniat, and J.-P. Diguet. 2012a. Bus-based MPSoC security through communication protection: A latency-efficient alternative. In Proceedings of the 2012 IEEE 20th Annual International Symposium on Field-Programmable Custom Computing Machines (FCCM’12). 200--207.
[12]
P. Cotret, F. Devic, G. Gogniat, B. Badrignans, and L. Torres. 2012b. Security enhancements for FPGA-based MPSoCs: A boot-to-runtime protection flow for an embedded linux-based system. In Proceedings of the 2012 7th International Workshop on Reconfigurable Communication-Centric Systems-on-Chip (ReCoSoC’12). 1--8.
[13]
J.-P. Diguet, S. Evain, R. Vaslin, G. Gogniat, and E. Juin. 2007. NOC-centric security of reconfigurable SoC. In Proceedings of the 1st International Symposium on Networks-on-Chip, 2007 (NOCS’07). 223--232.
[14]
L. Fiorin, S. Lukovic, and G. Palermo. 2008. Implementation of a reconfigurable data protection module for NoC-based MPSoCs. In Proceedings of the IEEE International Symposium on Parallel and Distributed Processing, 2008 (IPDPS’08). 1--8.
[15]
L. Fiorin, G. Palermo, and C. Silvano. 2009. MPSoCs run-time monitoring through networks-on-chip. In Proceedings of the Design, Automation Test in Europe Conference Exhibition, 2009 (DATE’09). 558--561.
[16]
D. Forte, Chongxi Bao, and A. Srivastava. 2013. Temperature tracking: An innovative run-time approach for hardware Trojan detection. In Proceedings of the 2013 IEEE/ACM International Conference on Computer-Aided Design (ICCAD’13). 532--539.
[17]
F. Gebali, H. Elmiligi, and M. El-Kharashi. 2009. Networks-on-Chips: Theory and Practice (1st ed.). CRC Press, Boca Raton, FL.
[18]
M. Hicks, M. Finnicum, S. T. King, M. M. K. Martin, and J. M. Smith. 2010. Overcoming an untrusted computing base: Detecting and removing malicious hardware automatically. In Proceedings of the 2010 IEEE Symposium on Security and Privacy. Oakland, CA, USA, 159--172.
[19]
K. Hu, A. N. Nowroz, S. Reda, and F. Koushanfar. 2013. High-sensitivity hardware Trojan detection using multimodal characterization. In Proceedings of the Design, Automation Test in Europe Conference Exhibition (DATE’13). 1271--1276.
[20]
R. Karri, J. Rajendran, K. Rosenfeld, and M. Tehranipoor. 2010. Trustworthy hardware: Identifying and classifying hardware Trojans. Computer 43, 10 (Oct. 2010), 39--46.
[21]
H. Khattri, N. K. V. Mangipudi, and S. Mandujano. 2012. HSDL: A security development lifecycle for hardware technologies. In Proceedings of the 2012 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST’12). 116--121.
[22]
M. Khavari, A. Kulkarni, A. Rahimi, T. Mohsenin, and H. Homayoun. 2014. Energy-efficient mapping of biomedical applications on domain-specific accelerator under process variation. In Proceedings of the 2014 International Symposium on Low Power Electronics and Design (ISLPED’14). ACM, New York, NY, 275--278.
[23]
S. Kim, S. Lee, and K. Cho. 2012. Design of high-speed support vector machine circuit for driver assistance system. In Proceedings of the 2012 International SoC Design Conference (ISOCC’12). 45--48.
[24]
A. Kulkarni, H. Homayoun, and T. Mohsenin. 2014. A parallel and reconfigurable architecture for efficient OMP compressive sensing reconstruction. In Proceedings of the 24th Edition of the Great Lakes Symposium on VLSI (GLSVLSI’14). ACM, New York, NY, 299--304.
[25]
A. Kulkarni and T. Mohsenin. 2014. Parallel heterogeneous architectures for efficient OMP compressive sensing reconstruction. In Proceedings of the International SPIE Conference on Defense, Security, and Sensing.
[26]
A. Kulkarni and T. Mohsenin. 2015. Accelerating compressive sensing reconstruction OMP algorithm with CPU, GPU, FPGA and domain specific many-core. In Proceedings of the 2015 IEEE International Symposium on Circuits and Systems (ISCAS’15). 970--973.
[27]
K. H. Lee, Z. Wang, and N. Verma. 2013. Hardware specialization of machine-learning kernels: Possibilities for applications and possibilities for the platform design space (Invited). In Proceedings of the 2013 IEEE Workshop on Signal Processing Systems (SiPS’13). 330--335.
[28]
A. Sadeghi and M. Mirza-Aghatabar. 2014. An asynchronous, low power and secure framework for network-on-chips. In IJCSNS International Journal of Computer Science and Network Security 8, 7 (2014), 214--223.
[29]
S. Narasimhan, W. Yueh, X. Wang, S. Mukhopadhyay, and S. Bhunia. 2012. Improving IC security against Trojan attacks through integration of security monitors. IEEE Design & Test of Computers 29, 5 (Oct. 2012), 37--46.
[30]
A. Page, C. Sagedy, E. Smith, N. Attaran, T. Oates, and T. Mohsenin. 2015. A flexible multichannel EEG feature extractor and classifier for seizure detection. IEEE Transactions on Circuits and Systems II: Express Briefs 62, 2 (Feb. 2015), 109--113.
[31]
N. Potlapally. 2011. Hardware security in practice: Challenges and opportunities. In Proceedings of the 2011 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST’11). 93--98.
[32]
J. Rajendran, E. Gavas, J. Jimenez, V. Padman, and R. Karri. 2010. Towards a comprehensive and systematic classification of hardware Trojans. In Proceedings of 2010 IEEE International Symposium on Circuits and Systems (ISCAS’10). 1871--1874.
[33]
M. Rostami, F. Koushanfar, and R. Karri. 2014. A primer on hardware security: Models, methods, and metrics. Proceedings of the IEEE 102, 8 (Aug. 2014), 1283--1295.
[34]
M. Rostami, F. Koushanfar, J. Rajendran, and R. Karri. 2013. Hardware security: Threat models and metrics. In Proceedings of the International Conference on Computer-Aided Design (ICCAD’13). IEEE Press, Piscataway, NJ, 819--823.
[35]
H. Salmani, M. Tehranipoor, and J. Plusquellic. 2012. A novel technique for improving hardware Trojan detection and reducing Trojan activation time. IEEE Transactions on Very Large Scale Integration (VLSI) Systems 20, 1 (Jan 2012), 112--125.
[36]
S. M. H. Shekarian, M. S. Zamani, and S. Alami. 2013. Neutralizing a design-for-hardware-trust technique. In Proceedings of the 2013 17th CSI International Symposium on Computer Architecture and Digital Systems (CADS’13). 73--78.
[37]
M. Tehranipoor and F. Koushanfar. 2010. A survey of hardware trojan taxonomy and detection. IEEE Design and Test of Computers 27, 1 (2010), 10--25.
[38]
S. Viseh, M. Ghovanloo, and T. Mohsenin. 2015. Toward an ultralow-power onboard processor for tongue drive system. IEEE Transactions on Circuits and Systems II: Express Briefs 62, 2 (Feb. 2015), 174--178.
[39]
A. Waksman and S. Sethumadhavan. 2011. Stealthy dopant-level hardware Trojans. In Proceedings of the 2011 IEEE Symposium on Security and Privacy. 49--63.
[40]
J. Yier and Y. Makris. 2008a. Hardware Trojan detection using path delay fingerprint. In Proceedings of the IEEE International Workshop on Hardware-Oriented Security and Trust, 2008 (HOST’08). 51--57.
[41]
J. Yier and Y. Makris. 2008b. Hardware Trojan detection using path delay fingerprint. In Proceedings of the 2008 IEEE International Workshop on Hardware-Oriented Security and Trust (HOST’08). 51--57.
[42]
J. Zhang, H. Yu, and Q. Xu. 2012. HTOutlier: Hardware Trojan detection with side-channel signature outlier identification. In Proceedings of the 2012 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST’12). 55--58.
[43]
J. Zhang, Feng Yuan, and Qiang Xu. 2014. DeTrust: Defeating hardware trust verification with stealthy implicitly-triggered hardware Trojans. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (CCS’14). ACM, New York, NY, 153--166.

Cited By

View all
  • (2024)TD-Zero: Automatic Golden-Free Hardware Trojan Detection Using Zero-Shot LearningIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems10.1109/TCAD.2024.335488943:7(1998-2011)Online publication date: 22-Jan-2024
  • (2024)A Machine Learning Approach for Traffic Anomaly Detection in NoC-based Manycores2024 37th SBC/SBMicro/IEEE Symposium on Integrated Circuits and Systems Design (SBCCI)10.1109/SBCCI62366.2024.10703991(1-5)Online publication date: 2-Sep-2024
  • (2024)Detection of Hardware Attacks in Network on Chip Based on Machine Learning2024 IEEE 7th International Conference on Electronic Information and Communication Technology (ICEICT)10.1109/ICEICT61637.2024.10671248(440-445)Online publication date: 31-Jul-2024
  • Show More Cited By

Index Terms

  1. Real-Time Anomaly Detection Framework for Many-Core Router through Machine-Learning Techniques

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Journal on Emerging Technologies in Computing Systems
      ACM Journal on Emerging Technologies in Computing Systems  Volume 13, Issue 1
      Special Issue on Secure and Trustworthy Computing
      January 2017
      208 pages
      ISSN:1550-4832
      EISSN:1550-4840
      DOI:10.1145/2917757
      • Editor:
      • Yuan Xie
      Issue’s Table of Contents
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Journal Family

      Publication History

      Published: 16 June 2016
      Accepted: 01 September 2015
      Revised: 01 July 2015
      Received: 01 December 2014
      Published in JETC Volume 13, Issue 1

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. Hardware security
      2. NoC
      3. anomaly detection
      4. machine learning
      5. many-core

      Qualifiers

      • Research-article
      • Research
      • Refereed

      Funding Sources

      • Defense Advanced Research Projects Agency (DARPA)

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)66
      • Downloads (Last 6 weeks)7
      Reflects downloads up to 10 Nov 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)TD-Zero: Automatic Golden-Free Hardware Trojan Detection Using Zero-Shot LearningIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems10.1109/TCAD.2024.335488943:7(1998-2011)Online publication date: 22-Jan-2024
      • (2024)A Machine Learning Approach for Traffic Anomaly Detection in NoC-based Manycores2024 37th SBC/SBMicro/IEEE Symposium on Integrated Circuits and Systems Design (SBCCI)10.1109/SBCCI62366.2024.10703991(1-5)Online publication date: 2-Sep-2024
      • (2024)Detection of Hardware Attacks in Network on Chip Based on Machine Learning2024 IEEE 7th International Conference on Electronic Information and Communication Technology (ICEICT)10.1109/ICEICT61637.2024.10671248(440-445)Online publication date: 31-Jul-2024
      • (2024)A Review on Tongue Based Assistive Technology, Devices and FPGA Processors Using Machine Learning ModuleWireless Personal Communications: An International Journal10.1007/s11277-024-10897-8134:1(151-170)Online publication date: 27-Feb-2024
      • (2023)Machine learning-based gait anomaly detection using a sensorized tip: an individualized approachNeural Computing and Applications10.1007/s00521-023-08601-135:24(17443-17459)Online publication date: 1-Aug-2023
      • (2023)Anomaly Detection Using Machine Learning Techniques: A Systematic ReviewAdvances in Data-Driven Computing and Intelligent Systems10.1007/978-981-99-3250-4_42(553-572)Online publication date: 4-Aug-2023
      • (2023)Security Aspects of Quantum Machine LearningQuantum Computing in Cybersecurity10.1002/9781394167401.ch12(201-216)Online publication date: 18-Oct-2023
      • (2022)Security Aspects of Quantum Machine Learning: Opportunities, Threats and DefensesProceedings of the Great Lakes Symposium on VLSI 202210.1145/3526241.3530833(463-468)Online publication date: 6-Jun-2022
      • (2022)Gradual-N-Justification (GNJ) to Reduce False-Positive Hardware Trojan Detection in Gate-Level NetlistIEEE Transactions on Very Large Scale Integration (VLSI) Systems10.1109/TVLSI.2022.314334930:4(515-525)Online publication date: Apr-2022
      • (2022)Hardware-Assisted Machine Learning in Resource-Constrained IoT Environments for Security: Review and Future ProspectiveIEEE Access10.1109/ACCESS.2022.317904710(58603-58622)Online publication date: 2022
      • Show More Cited By

      View Options

      Get Access

      Login options

      Full Access

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media