FILE DETECTION ON NETWORK TRAFFIC USING APPROXIMATE MATCHING

被引:0
|
作者
Breitinger, Frank [1 ]
Baggili, Ibrahim [1 ]
机构
[1] Univ New Haven, 300 Boston Post Rd, New Haven, CT 06511 USA
关键词
Approximate matching; Bloom filter; mrsh-v2; data loss prevention; network traffic analysis;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, Internet technologies changed enormously and allow faster Internet connections, higher data rates and mobile usage. Hence, it is possible to send huge amounts of data / files easily which is often used by insiders or attackers to steal intellectual property. As a consequence, data leakage prevention systems (DLPS) have been developed which analyze network traffic and alert in case of a data leak. Although the overall concepts of the detection techniques are known, the systems are mostly closed and commercial. Within this paper we present a new technique for network traffic analysis based on approximate matching (a.k.a fuzzy hashing) which is very common in digital forensics to correlate similar files. This paper demonstrates how to optimize and apply them on single network packets. Our contribution is a straightforward concept which does not need a comprehensive configuration: hash the file and store the digest in the database. Within our experiments we obtained false positive rates between 10(-4) and 10(-5) and an algorithm throughput of over 650 Mbit/s.
引用
收藏
页码:23 / 35
页数:13
相关论文
共 50 条
  • [31] Robust network traffic identification with graph matching
    Li, Wenhao
    Zhang, Xiao-Yu
    Bao, Huaifeng
    Wang, Qiang
    Li, Zhaoxuan
    COMPUTER NETWORKS, 2022, 218
  • [32] A network flow model for mixtures of file transfers and streaming traffic
    Key, P
    Massoulié, L
    Bain, A
    Kelly, F
    PROVIDING QUALITY OF SERVICE IN HETEROGENEOUS ENVIRONMENTS, VOLS 5A AND 5B, 2003, 5A-B : 1021 - 1030
  • [33] Mount SMB.pcap: Reconstructing file systems and file operations from network traffic
    Hilgert, Jan-Niclas
    Mahr, Axel
    Lambertz, Martin
    FORENSIC SCIENCE INTERNATIONAL-DIGITAL INVESTIGATION, 2024, 50
  • [34] Reducing file-related network traffic in treadmarks via parallel file input/output
    Shieh, CK
    Mac, SC
    Shieh, BJ
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 1999, 15 (04) : 569 - 583
  • [35] Enhancing Program Dependency Graph Based Clone Detection using Approximate Subgraph Matching
    Kamalpriya, C. M.
    Singh, Paramvir
    2017 IEEE 11TH INTERNATIONAL WORKSHOP ON SOFTWARE CLONES (IWSC), 2017, : 61 - 67
  • [36] Using OpenCL to Improve String Matching for Network Intrusion Detection
    Velea, Radu
    Patriciu, Victor-Valeriu
    Gurzau, Florina
    2015 20TH INTERNATIONAL CONFERENCE ON CONTROL SYSTEMS AND COMPUTER SCIENCE, 2015, : 447 - 452
  • [37] Fault detection in an ethernet network using anomaly signature matching
    Feather, Frank
    Maxion, Roy
    Computer Communications Review, 1993, 23 (04):
  • [38] An Agile Matching Network using Phase Detection for Antenna Tuning
    Robichaud, Alexandre
    Alameh, Abdul Hafiz
    Nabki, Frederic
    Deslandes, Dominic
    2013 IEEE 20TH INTERNATIONAL CONFERENCE ON ELECTRONICS, CIRCUITS, AND SYSTEMS (ICECS), 2013, : 755 - 758
  • [39] Peer-to-peer file sharing communication detection system using the traffic feature extraction
    Togawa, Satoshi
    Kanenishi, Kazuhide
    Yano, Yoneo
    2006 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS, VOLS 1-6, PROCEEDINGS, 2006, : 2993 - +
  • [40] Network Traffic Examination for Network Intrusion Detection in IOV using Autoencoder and Decoder
    Vaishnodevi, S.
    Kumar, Vinod D.
    Murali, G.
    Azhagiri, M.
    Madhuvappan, Arunkumar C.
    Sathishkumar, K.
    2024 SECOND INTERNATIONAL CONFERENCE ON INTELLIGENT CYBER PHYSICAL SYSTEMS AND INTERNET OF THINGS, ICOICI 2024, 2024, : 13 - 18