Using Deep Packet Inspection in Cyber Traffic Analysis

被引:6
|
作者
Deri, Luca [1 ]
Fusco, Francesco [2 ]
机构
[1] Ntop, Pisa, Italy
[2] IBM Res, Zurich, Switzerland
来源
PROCEEDINGS OF THE 2021 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE (IEEE CSR) | 2021年
关键词
Deep packet inspection; Encrypted traffic analysis; Open-source;
D O I
10.1109/CSR51186.2021.9527976
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years we have observed an escalation of cybersecurity attacks, which are becoming more sophisticated and harder to detect as they use more advanced evasion techniques and encrypted communications. The research community has often proposed the use of machine learning techniques to overcome the limitations of traditional cybersecurity approaches based on rules and signatures, which are hard to maintain, require constant updates, and do not solve the problems of zero-day attacks. Unfortunately, machine learning is not the holy grail of cybersecurity: machine learning-based techniques are hard to develop due to the lack of annotated data, are often computationally intensive, they can be target of hard to detect adversarial attacks, and more importantly are often not able to provide explanations for the predicted outcomes. In this paper, we describe a novel approach to cybersecurity detection leveraging on the concept of security score. Our approach demonstrates that extracting signals via deep packet inspections paves the way for efficient detection using traffic analysis. This work has been validated against various traffic datasets containing network attacks, showing that it can effectively detect network threats without the complexity of machine learning-based solutions.
引用
收藏
页码:89 / 94
页数:6
相关论文
共 50 条
  • [21] A TRAFFIC DRIVEN POWER CONTROL ALGORITHM FOR PARALLEL DEEP PACKET INSPECTION
    Zhou, Ya-Chao
    PROCEEDINGS OF 2013 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS (ICMLC), VOLS 1-4, 2013, : 1572 - 1577
  • [22] P2PTV Traffic Localization by Deep Packet Inspection
    Hiep Hoang-Van
    Miyoshi, Takumi
    Fourmaux, Olivier
    2013 14TH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD 2013), 2013, : 375 - 380
  • [23] Deep packet inspection using parallel bloom filters
    Dharmapurikar, S
    Krishnamurthy, P
    Sproull, TS
    Lockwood, JW
    IEEE MICRO, 2004, 24 (01) : 52 - 61
  • [24] Deep Packet Inspection on Commodity Hardware using FastFlow
    Danelutto, M.
    Deri, L.
    De Sensi, D.
    Torquati, M.
    PARALLEL COMPUTING: ACCELERATING COMPUTATIONAL SCIENCE AND ENGINEERING (CSE), 2014, 25 : 92 - 99
  • [25] Efficient deep packet inspection using String Expression
    Zhang, Shuzhuang
    Luo, Hao
    Fang, Binxing
    ICIC Express Letters, 2010, 4 (6 B): : 2489 - 2494
  • [26] Mobile security using separated deep packet inspection
    Jacoby, Grant A.
    Mosley, Shawn
    2008 5TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-3, 2008, : 482 - 487
  • [27] Deep packet inspection using parallel bloom filters
    Dharmapurikar, S
    Krishnamurthy, P
    Sproull, T
    Lockwood, J
    HOT INTERCONNECTS 11, 2003, : 44 - 51
  • [28] Deep Packet Inspection using Finate State Machines
    Krishna, B. Murali
    Sankar, G. N. V. Siva
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON CONTROL AUTOMATION, COMMUNICATION AND ENERGY CONSERVATION INCACEC 2009 VOLUME II, 2009, : 635 - 645
  • [29] Cost Analysis of Deep Packet Inspection in PCC Architecture
    Lin, Chuan-Sheng
    Sou, Sok-Ian
    INTELLIGENT SYSTEMS AND APPLICATIONS (ICS 2014), 2015, 274 : 1499 - 1507
  • [30] Efficient Keyword Matching for Deep Packet Inspection based Network Traffic Classification
    Khandait, Pratibha
    Hubballi, Neminath
    Mazumdar, Bodhisatwa
    2020 INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS & NETWORKS (COMSNETS), 2020,