A Novel Approach to Deep Packet Inspection for Intrusion Detection

被引:12
|
作者
Parvat, Thaksen J. [1 ,3 ]
Chandra, Pravin [2 ,4 ]
机构
[1] GGS Indraprastha Univ, USET, New Delhi, India
[2] GGS Indraprastha Univ, USICT, New Delhi, India
[3] GGS Indraprastha Univ, USET, Dwarka 78, India
[4] GGS Indraprastha Univ, USICT, Dwarka 78, India
关键词
Intrusion Detection; Packet Inspection; Security; Performance;
D O I
10.1016/j.procs.2015.03.091
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Intrusion detection and prevention is an integral part of Deep packet inspection. There are many methods and algorithms to detect signatures; each has its own merits and limitations. The measure of this time, accuracy and space requirement. All methods and algorithms are enhanced with technology revolutions. The development in anomaly and misuse detection in this decade is crucial as web services grow vast. Managing secure network is a challenge today. The objectives vary according to the infrastructure management and security policy. There are various ways to identify payload traffic using DPI, Network security, privacy and QoS. The functions of DPI are protocol detection, anti-virus, anti-malware and IDS/IPS. The detection engine may support by a signatures or heuristics. Most of the algorithms do training and testing separately, it takes approximately double time. The paper suggests a new model to improve performance of deep packet inspection for Intrusion detection system. (C) 2015 The Authors. Published by Elsevier B.V.
引用
收藏
页码:506 / 513
页数:8
相关论文
共 50 条
  • [1] Performance Improvement of Deep Packet Inspection for Intrusion Detection
    Parvat, Thaksen J.
    Chandra, Pravin
    [J]. 2014 IEEE GLOBAL CONFERENCE ON WIRELESS COMPUTING AND NETWORKING (GCWCN), 2014, : 224 - 228
  • [2] NETWORK INTRUSION DETECTION: USING MDLCOMPRESS FOR DEEP PACKET INSPECTION
    Eiland, E. Earl
    Evans, Scott C.
    Markham, T. Stephen
    Barnett, Bruce
    Impson, Jeremy
    Steinbrecher, Eric
    [J]. 2008 IEEE MILITARY COMMUNICATIONS CONFERENCE: MILCOM 2008, VOLS 1-7, 2008, : 994 - +
  • [3] Development of Deep Packet Inspection System for Network Traffic Analysis and Intrusion Detection
    Cheng, Zhihui
    Beshley, Mykola
    Beshley, Halyna
    Kochan, Orest
    Urikova, Oksana
    [J]. 15TH INTERNATIONAL CONFERENCE ON ADVANCED TRENDS IN RADIOELECTRONICS, TELECOMMUNICATIONS AND COMPUTER ENGINEERING (TCSET - 2020), 2020, : 877 - 881
  • [4] Deep packet inspection for intelligent intrusion detection in software-defined industrial networks: A proof of concept
    Sainz, Markel
    Garitano, Inaki
    Iturbe, Mikel
    Zurutuza, Urko
    [J]. LOGIC JOURNAL OF THE IGPL, 2020, 28 (04) : 461 - 472
  • [5] Improved deep packet inspection in data stream detection
    Yin, Chunyong
    Wang, Hongyi
    Yin, Xiang
    Sun, Ruxia
    Wang, Jin
    [J]. JOURNAL OF SUPERCOMPUTING, 2019, 75 (08): : 4295 - 4308
  • [6] Improved deep packet inspection in data stream detection
    Chunyong Yin
    Hongyi Wang
    Xiang Yin
    Ruxia Sun
    Jin Wang
    [J]. The Journal of Supercomputing, 2019, 75 : 4295 - 4308
  • [7] An Approach for Unifying Rule Based Deep Packet Inspection
    Munoz, A.
    Sezer, S.
    Burns, D.
    Douglas, G.
    [J]. 2011 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2011,
  • [8] Intrusive Detection System Implementation Using Deep Packet Inspection
    Zoican, Sorin
    Zoican, Roxana
    [J]. 2013 11TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS IN MODERN SATELLITE, CABLE AND BROADCASTING SERVICES (TELSIKS), VOLS 1 AND 2, 2013, : 413 - 416
  • [9] DPI & DFI: a Malicious Behavior Detection Method Combining Deep Packet Inspection and Deep Flow Inspection
    Guo, Yu -tong
    Gao, Yang
    Wang, Yan
    Qin, Meng-yuan
    Pu, Yu-jie
    Wang, Zeng
    Liu, Dan-dan
    Chen, Xiang-jun
    Gao, Tian-fng
    Lv, Ting-ting
    Fu, Zhong-chuan
    [J]. 13TH GLOBAL CONGRESS ON MANUFACTURING AND MANAGEMENT, 2017, 174 : 1309 - 1314
  • [10] Deep Packet Inspection as a Service
    Bremler-Barr, Anat
    Harchol, Yotam
    Hay, David
    Koral, Yaron
    [J]. PROCEEDINGS OF THE 2014 CONFERENCE ON EMERGING NETWORKING EXPERIMENTS AND TECHNOLOGIES (CONEXT'14), 2014, : 271 - 282