Survey on RDMA protocol applications and security protection technologies

The remote direct memory access (RDMA) technology, which has been effectively utilized to enhance data transfer rates and reduce CPU utilization, has played a significant role in various domains such as cross-regional data center transfers, high-performance computing, and rapid data read/write opera...

Full description

Saved in:
Bibliographic Details
Main Authors: LIU Yumeng, TANG Zhengliang, LU Songfeng, ZHU Jianxin, LIU Yunqu
Format: Article
Language:English
Published: POSTS&TELECOM PRESS Co., LTD 2024-04-01
Series:网络与信息安全学报
Subjects:
Online Access:http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2024022
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841529566742446080
author LIU Yumeng
TANG Zhengliang
LU Songfeng
ZHU Jianxin
LIU Yunqu
author_facet LIU Yumeng
TANG Zhengliang
LU Songfeng
ZHU Jianxin
LIU Yunqu
author_sort LIU Yumeng
collection DOAJ
description The remote direct memory access (RDMA) technology, which has been effectively utilized to enhance data transfer rates and reduce CPU utilization, has played a significant role in various domains such as cross-regional data center transfers, high-performance computing, and rapid data read/write operations. However, despite its emerging status, RDMA has been lacking in widely recognized security solutions. With the expansion of RDMA applications from dedicated network environments to general Ethernet networks, the need to address the security risks faced by these applications has become imperative. A set of protective measures were established to ensure security without compromising transmission efficiency. Furthermore, the unique underlying implementation and protocol design of RDMA technology have resulted in incompatibility with existing mature security solutions and have led to the confrontation with specific security risks. The development of RDMA attack and defense technologies and the provision of security guarantees for the forthcoming widespread application of RDMA technology were elucidated The principles of RDMA technology and its implementation were proposed, with examples drawn from the InfiniBand (IB) and the RDMA over converged Ethernet (RoCE) second edition protocols. The security risks faced by RDMA applications in relevant scenarios were investigated, and a summary of the research progress in the RDMA security field over recent years was provided. Effective security solutions addressing these risks were compiled and, after their defensive capabilities were proven, a comparison of their advantages and disadvantages was conducted through theoretical analysis and experimental data. Finally, improvement plans and prospects for technological optimization in the RDMA attack and defense field were proposed.
format Article
id doaj-art-d4fe59c79e4b4803a72b3d8b8268e301
institution Kabale University
issn 2096-109X
language English
publishDate 2024-04-01
publisher POSTS&TELECOM PRESS Co., LTD
record_format Article
series 网络与信息安全学报
spelling doaj-art-d4fe59c79e4b4803a72b3d8b8268e3012025-01-15T03:17:07ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2024-04-0110224663897354Survey on RDMA protocol applications and security protection technologiesLIU YumengTANG ZhengliangLU SongfengZHU JianxinLIU YunquThe remote direct memory access (RDMA) technology, which has been effectively utilized to enhance data transfer rates and reduce CPU utilization, has played a significant role in various domains such as cross-regional data center transfers, high-performance computing, and rapid data read/write operations. However, despite its emerging status, RDMA has been lacking in widely recognized security solutions. With the expansion of RDMA applications from dedicated network environments to general Ethernet networks, the need to address the security risks faced by these applications has become imperative. A set of protective measures were established to ensure security without compromising transmission efficiency. Furthermore, the unique underlying implementation and protocol design of RDMA technology have resulted in incompatibility with existing mature security solutions and have led to the confrontation with specific security risks. The development of RDMA attack and defense technologies and the provision of security guarantees for the forthcoming widespread application of RDMA technology were elucidated The principles of RDMA technology and its implementation were proposed, with examples drawn from the InfiniBand (IB) and the RDMA over converged Ethernet (RoCE) second edition protocols. The security risks faced by RDMA applications in relevant scenarios were investigated, and a summary of the research progress in the RDMA security field over recent years was provided. Effective security solutions addressing these risks were compiled and, after their defensive capabilities were proven, a comparison of their advantages and disadvantages was conducted through theoretical analysis and experimental data. Finally, improvement plans and prospects for technological optimization in the RDMA attack and defense field were proposed.http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2024022remote direct memory accessInfiniBand protocolRDMA over converged Ethernetprotocol vulnerabilityprotocol protection
spellingShingle LIU Yumeng
TANG Zhengliang
LU Songfeng
ZHU Jianxin
LIU Yunqu
Survey on RDMA protocol applications and security protection technologies
网络与信息安全学报
remote direct memory access
InfiniBand protocol
RDMA over converged Ethernet
protocol vulnerability
protocol protection
title Survey on RDMA protocol applications and security protection technologies
title_full Survey on RDMA protocol applications and security protection technologies
title_fullStr Survey on RDMA protocol applications and security protection technologies
title_full_unstemmed Survey on RDMA protocol applications and security protection technologies
title_short Survey on RDMA protocol applications and security protection technologies
title_sort survey on rdma protocol applications and security protection technologies
topic remote direct memory access
InfiniBand protocol
RDMA over converged Ethernet
protocol vulnerability
protocol protection
url http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2024022
work_keys_str_mv AT liuyumeng surveyonrdmaprotocolapplicationsandsecurityprotectiontechnologies
AT tangzhengliang surveyonrdmaprotocolapplicationsandsecurityprotectiontechnologies
AT lusongfeng surveyonrdmaprotocolapplicationsandsecurityprotectiontechnologies
AT zhujianxin surveyonrdmaprotocolapplicationsandsecurityprotectiontechnologies
AT liuyunqu surveyonrdmaprotocolapplicationsandsecurityprotectiontechnologies