{"title":"A GTP stateful inspection method based on network processor","authors":"Xiaoli Zhang, Yue Lai, S. Xie","doi":"10.1109/ICCS.2008.4737332","DOIUrl":null,"url":null,"abstract":"GPRS tunnelling protocol (GTP) is the protocol used in general packet radio service (GPRS) Core network, and it will also be used in the 3rd Generation (3G) network. In view of that few study concerns about GTP stateful inspection at present, this paper introduces a method of GTP stateful inspection on the foundation of analyzing the GTP protocol and provides the implementation of the method based on Intel network processor IXP28xx. In the implementation, the method employs a data structure adapting to the memory managing and accessing of the network processor. Furthermore, a new hash algorithm named hash_fold_16_4 algorithm is put forward to achieve fast index to the data structure. Experiment results show that the method is practicable and effective.","PeriodicalId":208126,"journal":{"name":"2008 11th IEEE Singapore International Conference on Communication Systems","volume":"15 5 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 11th IEEE Singapore International Conference on Communication Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCS.2008.4737332","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
GPRS tunnelling protocol (GTP) is the protocol used in general packet radio service (GPRS) Core network, and it will also be used in the 3rd Generation (3G) network. In view of that few study concerns about GTP stateful inspection at present, this paper introduces a method of GTP stateful inspection on the foundation of analyzing the GTP protocol and provides the implementation of the method based on Intel network processor IXP28xx. In the implementation, the method employs a data structure adapting to the memory managing and accessing of the network processor. Furthermore, a new hash algorithm named hash_fold_16_4 algorithm is put forward to achieve fast index to the data structure. Experiment results show that the method is practicable and effective.