24660

Acceleration of Intrusion Detection in Encrypted Network Traffic Using Heterogeneous Hardware

Eva Papadogiannaki, Sotiris Ioannidis
Institute of Computer Science, Foundation for Research and Technology—Hellas (FORTH), GR-70013 Heraklion, Crete, Greece
Sensors, 21, 1140, 2021

@article{papadogiannaki2021acceleration,

   title={Acceleration of Intrusion Detection in Encrypted Network Traffic Using Heterogeneous Hardware},

   author={Papadogiannaki, Eva and Ioannidis, Sotiris},

   journal={Sensors},

   volume={21},

   number={4},

   pages={1140},

   year={2021},

   publisher={Multidisciplinary Digital Publishing Institute}

}

Download Download (PDF)   View View   Source Source   

518

views

More than 75% of Internet traffic is now encrypted, and this percentage is constantly increasing. The majority of communications are secured using common encryption protocols such as SSL/TLS and IPsec to ensure security and protect the privacy of Internet users. However, encryption can be exploited to hide malicious activities, camouflaged into normal network traffic. Traditionally, network traffic inspection is based on techniques like deep packet inspection (DPI). Common applications for DPI include but are not limited to firewalls, intrusion detection and prevention systems, L7 filtering, and packet forwarding. With the widespread adoption of network encryption though, DPI tools that rely on packet payload content are becoming less effective, demanding the development of more sophisticated techniques in order to adapt to current network encryption trends. In this work, we present HeaderHunter, a fast signature-based intrusion detection system even for encrypted network traffic. We generate signatures using only network packet metadata extracted from packet headers. In addition, we examine the processing acceleration of the intrusion detection engine using different heterogeneous hardware architectures.
No votes yet.
Please wait...

* * *

* * *

HGPU group © 2010-2021 hgpu.org

All rights belong to the respective authors

Contact us: