Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Benfano Soewito is active.

Publication


Featured researches published by Benfano Soewito.


bioinformatics and bioengineering | 2007

Methodology for Evaluating DNA Pattern Searching Algorithms on Multiprocessor

Benfano Soewito; Ning Weng

Pattern matching has been one of the major operations in modern bioengineering especially in Bioinformatics. Prior work on this area have focus on either pursuing mathematically efficient matching algorithms or hardwired approach. As multicore processor are becoming mainstream, developers need to determine how to take advantage of multicore technology for pattern matching. In this paper, we propose a methodology to evaluate pattern search algorithms for DNA on Multiprocessor. Our evaluation methodology is an automatic simulation framework. Starting from a uniprocessor profiling, the framework constructs task graphs for string matching algorithms. Then task graphs are mapped onto multiprocessor. The systems performance is determined by the analytical performance model. With this framework, we can evaluate the performance of different algorithms on multiprocessor. Our case studies show that finite automaton based (Aho-Corasick) is more efficient than shift table based algorithms (SFKSearch and Wu-Manber) on uniprocessor, however, Wu-Manber is 3 times efficient than Aho-Corasick on multiprocessor due to its inherent parallelism.


Security and Communication Networks | 2011

Hybrid pattern matching for trusted intrusion detection

Benfano Soewito; Lucas Vespa; Ning Weng; Haibo Wang

Intrusion Detection Systems (IDSs) rely on pattern matching to detect and thwart a network attack by comparing packets with a database of known attack patterns. The key requirements of trusted intrusion detection are accurate pattern matching, adaptive, and reliable reconfiguration for new patterns. To address these requirements, this paper presents a trusted intrusion detection by utilizing hybrid pattern matching engines: FPGA-based and multicore-based pattern matching engine. To achieve synchronization of these two pattern matching engines, methodologies including multi-threading DFA and clustered state coding have been developed. These hybrid pattern matching engines increases the reliability and trustworthy of intrusion detection systems. Copyright


acs/ieee international conference on computer systems and applications | 2008

Mapping task graphs onto Network Processors using genetic algorithm

Ning Weng; Nandeesh Kumar; Satish Dechu; Benfano Soewito

Network processors (NPs) are embedded system-on-a- chip multiprocessors that are optimized to perform simple packet processing tasks at data rates of several Gigabytes per second. They are the key components to build a performance-scalable and function-flexible network systems. To meet the performance demands of increasing link speeds and more complex network applications, NPs are implemented with several dozen of processor cores and run multiple packet processing applications in parallel. This trend makes it increasingly difficult for application developers to program NPs for high performance. This paper presents an automated task scheduling technique to address this parallel programming complexity. Our proposed technique is based on GA. By incorporating tasks dependency into scheduling list and encoding task scheduling list as a chromosome, GA can quickly remove the invalid mappings and evolve to the high quality solutions. This technique takes advantage of task-level and application-level parallelism to maximize system performance for a given NPs architecture. The simulation results show that this proposed technique can generate high quality mapping comparing to other heuristics by mapping some sample network applications. This work will also enable researchers and engineers to systematically evaluate and quantitatively understand the NPs system issues including application partitioning, architecture organizing, workload mapping and run-time operating.


International Journal of Communication Networks and Distributed Systems | 2009

High-speed string matching for network intrusion detection

Benfano Soewito; Ajay Mahajan; Ning Weng; Haibo Wang

Intrusion detection systems are promising techniques to improve internet security. A daunting challenge in the design of internet intrusion detection systems is how to perform high-speed string matching operations. This paper presents a string matching architecture, consisting of software based classifiers and hardware based verifiers. Based on incoming packet contents, the packet classifiers can dramatically reduce the number of strings to be matched and accordingly, feed the packet to a proper verifier to conduct matching. The paper presents the proposed classifier architecture and discusses the trade-offs in the classifier design. In addition, techniques, including multi-threading FSM, high-speed FSM interface circuits and interconnects for high-speed verifier implementation on FPGA platforms are discussed. Experimental results are presented to explore the trade-offs between system performance, strings partition granularity and hardware resource cost.


ieee region 10 conference | 2008

Characterizing Power and Resource Consumption of Encryption/Decryption in Portable Devices

Benfano Soewito; Lucas Vespa; Ning Weng

One way to facilitate private communication is to transform information using encryption. However, encryption algorithms are computation-intensive and power-hungry operations for portable devices, which have computing resource limits and energy constraints. Choosing a suitable encryption-decryption algorithm to implement in portable devices is an important decision that needs to be made in order to secure the exchange of sensitive information without over utilizing the power source, processor and memory in mobile devices. This paper provides a methodology to comprehensively evaluate encryption/decryption algorithms for portable devices based on energy, delay, and footprint. Our result is based on four cutting edge algorithms: RC6, Serpent, Mars, and Twofish, and can help to analyze the power and resource overhead of encryption/decryption, as well as other applications running on mobile devices.


field programmable gate arrays | 2008

Implementing high-speed string matching hardware for network intrusion detection systems

Atul Mahajan; Benfano Soewito; Sai K. Parsi; Ning Weng; Haibo Wang

This paper presents a string matching hardware on FPGA for network intrusion detection systems. The proposed architecture, consisting of packet classifiers and strings matching verifiers, achieves superb throughput by using several mechanisms. First, based on incoming packet contents, the packet classifiers can dramatically reduce the number of strings to be matched for each packet and, accordingly, feed the packet to a proper verifier to conduct matching. Second, a novel multi-threading finite state machine (FSM) is proposed, which improves FSM clock frequency and allows multiple packets to be examined by a single FSM simultaneously. Design techniques for high-speed interconnect and interface circuits are also presented. Experimental results are presented to explore the trade-offs between system performance, strings partition granularity and hardware resource cost


Microprocessors and Microsystems | 2009

Optimized memory based accelerator for scalable pattern matching

Lucas Vespa; Ning Weng; Benfano Soewito

One of the most promising techniques to detect and thwart a network attack in a network intrusion detection system is to compare each incoming packet with pre-defined attack patterns. This comparison can be performed by a pattern matching engine which has several key requirements including scalability to line rates of network traffic and easy updating of new attack patterns. Memory-based deterministic finite automata meet these requirements, however their storage requirement will grow exponentially with the number of patterns which makes it impractical for implementation. In this paper, we propose a customized memory-based pattern matching engine, whose storage requirement linearly increases with the number of patterns. The basic idea is to allocate one memory slot for each state instead of each edge of the deterministic finite automaton. To demonstrate this idea, we have developed two customized memory decoders. We evaluate them by comparing with a traditional approach in terms of programmability and resource requirements. We also examine their effectiveness for different optimized deterministic finite automata. Experimental results are presented to demonstrate the validity of our proposed approach.


acs/ieee international conference on computer systems and applications | 2008

Methodology for evaluating string matching algorithms on multiprocessor

Benfano Soewito; Ning Weng

The Internet is suffering caused by the lacking of security. One of the most promising ways to provide security is Intrusion Detection Systems (IDSs). The heart of almost every IDSs is a string matching algorithm, which is a very computational intensive task. Network Processors (NPs), a specialized multiprocessor, can provide flexibility and high performance for string matching. This paper evaluates several key string matching algorithms using a comprehensive simulation framework. Starting from a uniprocessor profiling, the framework constructs task graphs for string matching algorithms. Then task graphs are mapped onto NPs together with other network applications. The system throughput is determined by the analytical performance model. With this framework, we can evaluate the performance of different string matching algorithms on NPs. Our results show that shift table based algorithms (SFKSearch and Wu-Manber) and finite automaton based Aho-Corasick are complementary: SFKSearch and Wu-Manber do better job in NPs for good packet and larger pattern length due to better inter-task parallelism and shifting; Aho-Corasick does not depend on minimal pattern length and shows relative small processing cost variation between bad and good packets.


International Journal of Computational Biology and Drug Design | 2008

Evaluating DNA sequence searching algorithms on multicore

Ning Weng; Benfano Soewito

Sequence searching is one of major operations in modern bioengineering. Recent emerging multicore provides a promising technology to enhance sequence searching performance. However, efficiently employing the multicore for a uniprocessor-oriented algorithm is a difficult task. This paper presents a methodology to profile processing requirements for DNA sequence search algorithms, parallelise them onto multicore, and analytically evaluate their performance. The key feature of this methodology is that entire processes are automated and it requires users little understanding of the complexity of algorithms and multicore hardware architecture. Our methodology considers three approaches to parallelise searching operations: queries, database, and task segmentation.


IEEE Network | 2009

Self-addressable memory-based FSM: a scalable intrusion detection engine

Benfano Soewito; Lucas Vespa; Atul Mahajan; Ning Weng; Haibo Wang

Collaboration


Dive into the Benfano Soewito's collaboration.

Top Co-Authors

Avatar

Ning Weng

Southern Illinois University Carbondale

View shared research outputs
Top Co-Authors

Avatar

Haibo Wang

Southern Illinois University Carbondale

View shared research outputs
Top Co-Authors

Avatar

Lucas Vespa

Southern Illinois University Carbondale

View shared research outputs
Top Co-Authors

Avatar

Atul Mahajan

Southern Illinois University Carbondale

View shared research outputs
Top Co-Authors

Avatar

Sai K. Parsi

Southern Illinois University Carbondale

View shared research outputs
Top Co-Authors

Avatar

Satish Dechu

Southern Illinois University Carbondale

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Luke Vespa

Southern Illinois University Carbondale

View shared research outputs
Top Co-Authors

Avatar

Nandeesh Kumar

Southern Illinois University Carbondale

View shared research outputs
Researchain Logo
Decentralizing Knowledge