Using Deep Packet Inspection in Cyber Traffic Analysis

被引:4
|
作者
Deri, Luca [1 ]
Fusco, Francesco [2 ]
机构
[1] Ntop, Pisa, Italy
[2] IBM Res, Zurich, Switzerland
关键词
Deep packet inspection; Encrypted traffic analysis; Open-source;
D O I
10.1109/CSR51186.2021.9527976
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years we have observed an escalation of cybersecurity attacks, which are becoming more sophisticated and harder to detect as they use more advanced evasion techniques and encrypted communications. The research community has often proposed the use of machine learning techniques to overcome the limitations of traditional cybersecurity approaches based on rules and signatures, which are hard to maintain, require constant updates, and do not solve the problems of zero-day attacks. Unfortunately, machine learning is not the holy grail of cybersecurity: machine learning-based techniques are hard to develop due to the lack of annotated data, are often computationally intensive, they can be target of hard to detect adversarial attacks, and more importantly are often not able to provide explanations for the predicted outcomes. In this paper, we describe a novel approach to cybersecurity detection leveraging on the concept of security score. Our approach demonstrates that extracting signals via deep packet inspections paves the way for efficient detection using traffic analysis. This work has been validated against various traffic datasets containing network attacks, showing that it can effectively detect network threats without the complexity of machine learning-based solutions.
引用
收藏
页码:89 / 94
页数:6
相关论文
共 50 条
  • [31] Efficient Keyword Matching for Deep Packet Inspection based Network Traffic Classification
    Khandait, Pratibha
    Hubballi, Neminath
    Mazumdar, Bodhisatwa
    [J]. 2020 INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS & NETWORKS (COMSNETS), 2020,
  • [32] Cost Analysis of Deep Packet Inspection in PCC Architecture
    Lin, Chuan-Sheng
    Sou, Sok-Ian
    [J]. INTELLIGENT SYSTEMS AND APPLICATIONS (ICS 2014), 2015, 274 : 1499 - 1507
  • [33] Stochastic Packet Inspection for TCP Traffic
    La Mantia, Gianluca
    Rossi, Dario
    Finamore, Alessandro
    Mellia, Marco
    Meo, Michela
    [J]. 2010 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, 2010,
  • [34] Deep Packet Inspection as a Service
    Bremler-Barr, Anat
    Harchol, Yotam
    Hay, David
    Koral, Yaron
    [J]. PROCEEDINGS OF THE 2014 CONFERENCE ON EMERGING NETWORKING EXPERIMENTS AND TECHNOLOGIES (CONEXT'14), 2014, : 271 - 282
  • [35] Elastic Deep Packet Inspection
    Watson, Bruce W.
    [J]. 2014 6TH INTERNATIONAL CONFERENCE ON CYBER CONFLICT (CYCON 2014), 2014, : 241 - 253
  • [36] A Survey on Deep Packet Inspection
    El-Maghraby, Reham Taher
    Abd Elazim, Nada Mostafa
    Bahaa-Eldin, Ayaman M.
    [J]. 2017 12TH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND SYSTEMS (ICCES), 2017, : 188 - 197
  • [37] QCF for deep packet inspection
    Al-hisnawi, Mohammad
    Ahmadi, Mahmood
    [J]. IET NETWORKS, 2018, 7 (05) : 346 - 352
  • [38] Memory Efficient Deep Packet Inspection Using Transition Functions
    Lakshmi, K. Vasanta
    [J]. 2016 8TH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORKS (COMSNETS), 2016,
  • [39] Deep Packet Inspection using Ternary Content Addressable Memory
    Jayashree, S.
    Shivashankarappa, N.
    [J]. 2014 INTERNATIONAL CONFERENCE ON CIRCUITS, COMMUNICATION, CONTROL AND COMPUTING (I4C), 2014, : 441 - 447
  • [40] NETWORK INTRUSION DETECTION: USING MDLCOMPRESS FOR DEEP PACKET INSPECTION
    Eiland, E. Earl
    Evans, Scott C.
    Markham, T. Stephen
    Barnett, Bruce
    Impson, Jeremy
    Steinbrecher, Eric
    [J]. 2008 IEEE MILITARY COMMUNICATIONS CONFERENCE: MILCOM 2008, VOLS 1-7, 2008, : 994 - +