A double-compression method for searchable network packets in network forensics and analysis

被引:0
|
作者
Li, Zhenyu [1 ,2 ]
Ding, Yong [1 ,2 ,3 ]
Yi, Chen [3 ]
机构
[1] Guilin Univ Elect Technol, Guilin 541004, Peoples R China
[2] Guangxi Key Lab Cryptog & Informat Secur, Guilin 541004, Peoples R China
[3] HKCT Inst Higher Educ, Hong Kong, Peoples R China
基金
中国国家自然科学基金;
关键词
Compression; Decompression; Search; Packet; Storage;
D O I
10.1016/j.compeleceng.2024.109535
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Efficiently storing, searching, and extracting structured data such as network packets can significantly enhance cybersecurity analysis and artificial intelligence model training. This paper presents an efficient searchable double-compression method, PKTDC, which involves two processes: double compression and searchable decompression of specific packets. In double compression, PKTDC dynamically constructs an index to compress the searched data and then performs a second round of compression on this data and other payloads via a conventional algorithm. In searchable decompression, PKTDC reconstructs searchable packet information from the compressed data, partially decompresses the matched payloads, and stitches them together to restore the original packets. The experimental results show that PKTDC achieves up to 7.55% greater compression efficiency than LZMA2, reduces the search and decompression time by up to 21.6 times, reduces CPU usage by up to 5.51 times, and reduces memory usage by up to 2.9 times.
引用
收藏
页数:24
相关论文
共 50 条
  • [21] A Method for Classifying Packets into Network Flows Based on GHSOM
    Hongbo Shi
    Tomoki Hamagami
    Haoyuan Xu
    Ping Yu
    Yonghe Wu
    Mobile Networks and Applications, 2012, 17 : 730 - 739
  • [22] Thermodynamic analysis of double-compression flash intercooling transcritical CO2 refrigeration cycle
    Zhang, Zhenying
    Wang, Hongli
    Tian, Lili
    Huang, Chunsong
    JOURNAL OF SUPERCRITICAL FLUIDS, 2016, 109 : 100 - 108
  • [23] Attack Graph Analysis for Network Anti-Forensics
    Chandran, Rahul
    Yan, Wei Q.
    INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS, 2014, 6 (01) : 28 - 50
  • [24] Introduction to a Network Forensics System for Cyber Incidents Analysis
    Choi, Yangseo
    Lee, Joo-Young
    Choi, Sunoh
    Kim, Jong-Hyum
    Kim, Ikkyun
    2016 18TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATIONS TECHNOLOGY (ICACT) - INFORMATION AND COMMUNICATIONS FOR SAFE AND SECURE LIFE, 2016, : 50 - 55
  • [25] A MODEL FOR NFAA-NETWORK FORENSICS ATTACK ANALYSIS
    Rasmi, M.
    Jantan, Aman
    THIRD INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND TECHNOLOGY (ICCET 2011), 2011, : 739 - 746
  • [26] An Evidential Network Forensics Analysis with Metrics for Conviction Evidence
    Amran, Ahmad Roshidi
    Sand, Amna
    Abd Razak, Mohd Raziff
    2014 4TH INTERNATIONAL CONFERENCE ON ENGINEERING TECHNOLOGY AND TECHNOPRENEURSHIP (ICE2T), 2014, : 73 - 78
  • [27] Packet-Level Clustering for Memory-Assisted Compression of Network Packets
    Huang, Liling
    Beirami, Ahmad
    Sardari, Mohsen
    Fekri, Faramarz
    Liu, Bo
    Gui, Lin
    2014 SIXTH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS AND SIGNAL PROCESSING (WCSP), 2014,
  • [28] A Graph Based Approach Toward Network Forensics Analysis
    Wang, Wei
    Daniels, Thomas E.
    ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2008, 12 (01)
  • [29] Out of order packets analysis on a real network environment
    Serra-Gracia, Rene
    Jakab, Lorand
    Domingo-Pascual, Jordi
    2006 2ND CONFERENCE ON NEXT GENERATION INTERNET DESIGN AND ENGINEERING, 2006, : 269 - +
  • [30] Network Forensics Method Based on Evidence Graph and Vulnerability Reasoning
    He, Jingsha
    Chang, Chengyue
    He, Peng
    Pathan, Muhammad Salman
    FUTURE INTERNET, 2016, 8 (04):