A double-compression method for searchable network packets in network forensics and analysis

被引:0
|
作者
Li, Zhenyu [1 ,2 ]
Ding, Yong [1 ,2 ,3 ]
Yi, Chen [3 ]
机构
[1] Guilin Univ Elect Technol, Guilin 541004, Peoples R China
[2] Guangxi Key Lab Cryptog & Informat Secur, Guilin 541004, Peoples R China
[3] HKCT Inst Higher Educ, Hong Kong, Peoples R China
基金
中国国家自然科学基金;
关键词
Compression; Decompression; Search; Packet; Storage;
D O I
10.1016/j.compeleceng.2024.109535
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Efficiently storing, searching, and extracting structured data such as network packets can significantly enhance cybersecurity analysis and artificial intelligence model training. This paper presents an efficient searchable double-compression method, PKTDC, which involves two processes: double compression and searchable decompression of specific packets. In double compression, PKTDC dynamically constructs an index to compress the searched data and then performs a second round of compression on this data and other payloads via a conventional algorithm. In searchable decompression, PKTDC reconstructs searchable packet information from the compressed data, partially decompresses the matched payloads, and stitches them together to restore the original packets. The experimental results show that PKTDC achieves up to 7.55% greater compression efficiency than LZMA2, reduces the search and decompression time by up to 21.6 times, reduces CPU usage by up to 5.51 times, and reduces memory usage by up to 2.9 times.
引用
收藏
页数:24
相关论文
共 50 条
  • [1] Double-compression method for biomedical images
    Antonenko, Yevhenii A.
    Mustetsov, Timofey N.
    Hamdi, Rami R.
    Malecka-Massalska, Teresa
    Orshubekov, Nurbek
    Dzierzak, Roza
    Uvaysova, Svetlana
    PHOTONICS APPLICATIONS IN ASTRONOMY, COMMUNICATIONS, INDUSTRY, AND HIGH ENERGY PHYSICS EXPERIMENTS 2017, 2017, 10445
  • [2] Double JPEG compression forensics based on a convolutional neural network
    Wang Q.
    Zhang R.
    EURASIP Journal on Information Security, 2016 (1):
  • [3] Method Ontology for Intelligent Network Forensics Analysis
    Saad, Sherif
    Traore, Issa
    PST 2010: 2010 EIGHTH INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST, 2010, : 7 - 14
  • [4] Network forensics analysis
    Corey, V
    Peterman, C
    Shearin, S
    Greenberg, MS
    Van Bokkelen, J
    IEEE INTERNET COMPUTING, 2002, 6 (06) : 60 - 66
  • [5] An Email Forensics Analysis Method Based on Social Network Analysis
    Liu, YanHua
    Chen, GuoLong
    Xie, Lili
    2013 INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND BIG DATA (CLOUDCOM-ASIA), 2013, : 563 - 569
  • [6] A new method for estimating the primary quantization step of JPEG double-compression
    Wang, Jun-Wen
    Liu, Guang-Jie
    Dai, Yue-Wei
    Zhou, Lin-Na
    Guo, Yun-Biao
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2009, 31 (04): : 836 - 839
  • [7] A method of network forensics analysis based on frequent sequence mining
    Zhong Xiu-yu
    INTELLIGENT STRUCTURE AND VIBRATION CONTROL, PTS 1 AND 2, 2011, 50-51 : 578 - 582
  • [8] Improvement of NTP time offset under the asymmetric network with double packets method
    Gotoh, T
    Imamura, K
    Kaneko, A
    2002 CONFERENCE ON PRECISION ELECTROMAGNETIC MEASUREMENTS, CONFERENCE DIGEST, 2002, : 448 - 449
  • [9] An Improved Double Compression Detection Method for JPEG Image Forensics
    Thing, Vrizlynn L. L.
    Chen, Yu
    Cheh, Carmen
    2012 IEEE INTERNATIONAL SYMPOSIUM ON MULTIMEDIA (ISM), 2012, : 290 - 297
  • [10] Social Network Forensics Analysis Model Based on Network Representation Learning
    Zhao, Kuo
    Zhang, Huajian
    Li, Jiaxin
    Pan, Qifu
    Lai, Li
    Nie, Yike
    Zhang, Zhongfei
    ENTROPY, 2024, 26 (07)