A double-compression method for searchable network packets in network forensics and analysis

被引:0
|
作者
Li, Zhenyu [1 ,2 ]
Ding, Yong [1 ,2 ,3 ]
Yi, Chen [3 ]
机构
[1] Guilin Univ Elect Technol, Guilin 541004, Peoples R China
[2] Guangxi Key Lab Cryptog & Informat Secur, Guilin 541004, Peoples R China
[3] HKCT Inst Higher Educ, Hong Kong, Peoples R China
基金
中国国家自然科学基金;
关键词
Compression; Decompression; Search; Packet; Storage;
D O I
10.1016/j.compeleceng.2024.109535
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Efficiently storing, searching, and extracting structured data such as network packets can significantly enhance cybersecurity analysis and artificial intelligence model training. This paper presents an efficient searchable double-compression method, PKTDC, which involves two processes: double compression and searchable decompression of specific packets. In double compression, PKTDC dynamically constructs an index to compress the searched data and then performs a second round of compression on this data and other payloads via a conventional algorithm. In searchable decompression, PKTDC reconstructs searchable packet information from the compressed data, partially decompresses the matched payloads, and stitches them together to restore the original packets. The experimental results show that PKTDC achieves up to 7.55% greater compression efficiency than LZMA2, reduces the search and decompression time by up to 21.6 times, reduces CPU usage by up to 5.51 times, and reduces memory usage by up to 2.9 times.
引用
收藏
页数:24
相关论文
共 50 条
  • [11] Graphical analysis of captured network packets for detection of suspicious network nodes
    Aryeh, Felix Larbi
    Alese, Boniface Kayode
    Olasehinde, Olayemi
    2020 INTERNATIONAL CONFERENCE ON CYBER SITUATIONAL AWARENESS, DATA ANALYTICS AND ASSESSMENT (CYBER SA 2020), 2020,
  • [12] Attack Intention Analysis Model for Network Forensics
    Rasmi, M.
    Jantan, Aman
    SOFTWARE ENGINEERING AND COMPUTER SYSTEMS, PT 2, 2011, 180 : 403 - 411
  • [13] An Empirical Study of Network Forensics Analysis Tools
    Ghafarian, Ahmad
    PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS-2014), 2014, : 366 - 370
  • [14] Building evidence graphs for network forensics analysis
    Wang, W
    Daniels, TE
    21ST ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2005, : 229 - 239
  • [15] Understanding Network Forensics Analysis in an Operational Environment
    Raftopoulos, Elias
    Dimitropoulos, Xenofontas
    IEEE CS SECURITY AND PRIVACY WORKSHOPS (SPW 2013), 2013, : 111 - 118
  • [16] Network Security Approach for Digital Forensics Analysis
    Achi, H.
    Hellany, A.
    Nagrial, M.
    ICCES: 2008 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING & SYSTEMS, 2007, : 263 - 267
  • [17] Network Forensics: An Analysis of Techniques, Tools, and Trends
    Hunt, Ray
    Zeadally, Sherali
    COMPUTER, 2012, 45 (12) : 36 - 43
  • [18] Packet analysis for network forensics: A comprehensive survey
    Sikos, Leslie F.
    FORENSIC SCIENCE INTERNATIONAL-DIGITAL INVESTIGATION, 2020, 32
  • [19] Hypersparse Network Flow Analysis of Packets with GraphBLAS
    Trigg, Tyler
    Meiners, Chad
    Pisharody, Sandeep
    Jananthan, Hayden
    Jones, Michael
    Michaleas, Adam
    Davis, Timothy
    Welch, Erik
    Arcand, William
    Bestor, David
    Bergeron, William
    Byun, Chansup
    Gadepally, Vijay
    Houle, Micheal
    Hubbell, Matthew
    Klein, Anna
    Michaleas, Peter
    Milechin, Lauren
    Mullen, Julie
    Prout, Andrew
    Reuther, Albert
    Rosa, Antonio
    Samsi, Siddharth
    Stetson, Doug
    Yee, Charles
    Kepner, Jeremy
    2022 IEEE HIGH PERFORMANCE EXTREME COMPUTING VIRTUAL CONFERENCE (HPEC), 2022,
  • [20] A Method for Classifying Packets into Network Flows Based on GHSOM
    Shi, Hongbo
    Hamagami, Tomoki
    Xu, Haoyuan
    Yu, Ping
    Wu, Yonghe
    MOBILE NETWORKS & APPLICATIONS, 2012, 17 (06): : 730 - 739