A double-compression method for searchable network packets in network forensics and analysis

被引:0
|
作者
Li, Zhenyu [1 ,2 ]
Ding, Yong [1 ,2 ,3 ]
Yi, Chen [3 ]
机构
[1] Guilin Univ Elect Technol, Guilin 541004, Peoples R China
[2] Guangxi Key Lab Cryptog & Informat Secur, Guilin 541004, Peoples R China
[3] HKCT Inst Higher Educ, Hong Kong, Peoples R China
基金
中国国家自然科学基金;
关键词
Compression; Decompression; Search; Packet; Storage;
D O I
10.1016/j.compeleceng.2024.109535
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Efficiently storing, searching, and extracting structured data such as network packets can significantly enhance cybersecurity analysis and artificial intelligence model training. This paper presents an efficient searchable double-compression method, PKTDC, which involves two processes: double compression and searchable decompression of specific packets. In double compression, PKTDC dynamically constructs an index to compress the searched data and then performs a second round of compression on this data and other payloads via a conventional algorithm. In searchable decompression, PKTDC reconstructs searchable packet information from the compressed data, partially decompresses the matched payloads, and stitches them together to restore the original packets. The experimental results show that PKTDC achieves up to 7.55% greater compression efficiency than LZMA2, reduces the search and decompression time by up to 21.6 times, reduces CPU usage by up to 5.51 times, and reduces memory usage by up to 2.9 times.
引用
收藏
页数:24
相关论文
共 50 条
  • [41] Network Compression: Worst Case Analysis
    Asnani, Himanshu
    Shomorony, Ilan
    Avestimehr, A. Salman
    Weissman, Tsachy
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2015, 61 (07) : 3980 - 3995
  • [42] Forensic Analysis of Network Packets from Penetration Test Toolkits
    Kao, Da-Yu
    Wang, Yu-Siang
    Tsai, Fu-Ching
    Chen, Chien-Hung
    2018 20TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT), 2018, : 363 - 368
  • [43] Network Performance Analysis Using Packets Probe for Passive Monitoring
    Alkenani J.
    Nassar K.A.
    Informatica (Slovenia), 2022, 46 (07): : 153 - 160
  • [44] Network Forensics Scenario Reconstruction Method Based on Hidden Markov Models
    Gu, Weiping
    Xu, Liancheng
    Ren, Min
    Han, Xiaoyan
    2015 7TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY IN MEDICINE AND EDUCATION (ITME), 2015, : 500 - 505
  • [45] A Network Forensics Investigating Method Based on Weak Consistency for Distributed SDN
    Liu, Xuehua
    Ding, Liping
    Zheng, Tao
    Yu, Fang
    Jia, Zhen
    Xiao, Wang
    UBIQUITOUS SECURITY, 2022, 1557 : 241 - 254
  • [46] Network Coded Repetition: A Method to Recover Lost Packets in Vehicular Communications
    Wang, Zhe
    Hassan, Mahbub
    2011 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2011,
  • [47] A new video compression method for surveillance network
    Fu Xianping
    Liang Dequn
    2007 IFIP INTERNATIONAL CONFERENCE ON NETWORK AND PARALLEL COMPUTING WORKSHOPS, PROCEEDINGS, 2007, : 869 - +
  • [48] Symmetry Compression Method for Discovering Network Motifs
    Wang, Jianxin
    Huang, Yuannan
    Wu, Fang-Xiang
    Pan, Yi
    IEEE-ACM TRANSACTIONS ON COMPUTATIONAL BIOLOGY AND BIOINFORMATICS, 2012, 9 (06) : 1776 - 1789
  • [49] End-to-End Anti-Forensics Network of Single and Double JPEG Detection
    Kim, Dohyun
    Ahn, Wonhyuk
    Lee, Heung-Kyu
    IEEE ACCESS, 2021, 9 (09): : 13390 - 13402
  • [50] A novel median filtering forensics based on principal component analysis network
    Wang, Xian
    Li, Bing-Zhao
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2019, 11 (02) : 145 - 159