FILE DETECTION ON NETWORK TRAFFIC USING APPROXIMATE MATCHING

被引:0
|
作者
Breitinger, Frank [1 ]
Baggili, Ibrahim [1 ]
机构
[1] Univ New Haven, 300 Boston Post Rd, New Haven, CT 06511 USA
关键词
Approximate matching; Bloom filter; mrsh-v2; data loss prevention; network traffic analysis;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, Internet technologies changed enormously and allow faster Internet connections, higher data rates and mobile usage. Hence, it is possible to send huge amounts of data / files easily which is often used by insiders or attackers to steal intellectual property. As a consequence, data leakage prevention systems (DLPS) have been developed which analyze network traffic and alert in case of a data leak. Although the overall concepts of the detection techniques are known, the systems are mostly closed and commercial. Within this paper we present a new technique for network traffic analysis based on approximate matching (a.k.a fuzzy hashing) which is very common in digital forensics to correlate similar files. This paper demonstrates how to optimize and apply them on single network packets. Our contribution is a straightforward concept which does not need a comprehensive configuration: hash the file and store the digest in the database. Within our experiments we obtained false positive rates between 10(-4) and 10(-5) and an algorithm throughput of over 650 Mbit/s.
引用
收藏
页码:23 / 35
页数:13
相关论文
共 50 条
  • [21] Intrusion Detection Using Clustering of Network Traffic Flows
    Bailey, Matthew
    Collins, Connor
    Sinda, Matthew
    Hu, Gongzhu
    2017 18TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNDP 2017), 2017, : 615 - 620
  • [22] Unknown Malware Detection Using Network Traffic Classification
    Bekerman, Dmitri
    Shapira, Bracha
    Rokach, Lior
    Bar, Ariel
    2015 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2015, : 134 - 142
  • [23] Unsupervised anomaly detection for network traffic using artificial immune network
    Shi, Yuanquan
    Shen, Hong
    NEURAL COMPUTING & APPLICATIONS, 2022, 34 (15): : 13007 - 13027
  • [24] Unsupervised anomaly detection for network traffic using artificial immune network
    Yuanquan Shi
    Hong Shen
    Neural Computing and Applications, 2022, 34 : 13007 - 13027
  • [25] Detection and Classification of Network Traffic in Bot Network Using Deep Learning
    Srinarayani, K.
    Padmavathi, B.
    Datchanamoorthy, Kavitha
    Saraswathi, T.
    Maheswari, S.
    Vincy, R. Fatima
    JOURNAL OF INFORMATION & KNOWLEDGE MANAGEMENT, 2024, 23 (06)
  • [26] Saliency Map Generation by the Convolutional Neural Network for Real-Time Traffic Light Detection Using Template Matching
    John, Vijay
    Yoneda, Keisuke
    Liu, Zheng
    Mita, Seiichi
    IEEE TRANSACTIONS ON COMPUTATIONAL IMAGING, 2015, 1 (03) : 159 - 173
  • [27] Approximate Hausdorf matching using eigenspaces
    Huttenlocher, DP
    Lilien, RH
    Olson, CF
    IMAGE UNDERSTANDING WORKSHOP, 1996 PROCEEDINGS, VOLS I AND II, 1996, : 1181 - 1186
  • [28] Distributed File Allocation Using Matching Game in Mobile Fog-Caching Service Network
    Liu, Tingting
    Li, Jun
    Kim, BaekGyu
    Lin, Chung-Wei
    Shiraishi, Shinichi
    Xie, Jiang
    Han, Zhu
    IEEE INFOCOM 2018 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2018, : 499 - 504
  • [29] Regression Modeling and File Matching Using Possibly Erroneous Matching Variables
    Dalzell, Nicole M.
    Reiter, Jerome P.
    JOURNAL OF COMPUTATIONAL AND GRAPHICAL STATISTICS, 2018, 27 (04) : 728 - 738
  • [30] A multithreaded algorithm for network alignment via approximate matching
    Khan, Arif M.
    Gleich, David F.
    Pothen, Alex
    Halappanavar, Mahantesh
    2012 INTERNATIONAL CONFERENCE FOR HIGH PERFORMANCE COMPUTING, NETWORKING, STORAGE AND ANALYSIS (SC), 2012,