Institutional Repository
Technical University of Crete
EN  |  EL

Search

Browse

My Space

Head(er)Hunter: fast intrusion detection using packet metadata signatures

Papadogiannaki Eva, Deyannis Dimitris, Ioannidis Sotirios

Full record


URI: http://purl.tuc.gr/dl/dias/D19DF4C8-8581-4602-ABDE-C945B05E79BE
Year 2020
Type of Item Conference Publication
License
Details
Bibliographic Citation E. Papadogiannaki, D. Deyannis, and S. Ioannidis, “Head(er)Hunter: fast intrusion detection using packet metadata signatures,” in 2020 IEEE 25th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), Pisa, Italy, 2020, pp. 1-6, doi: 10.1109/CAMAD50429.2020.9209308. https://doi.org/10.1109/CAMAD50429.2020.9209308
Appears in Collections

Summary

More than 75% of the Internet traffic is now encrypted, while this percentage is constantly increasing. The majority of communications are secured using common encryption protocols such as SSL/TLS and IPsec to ensure security and protect the privacy of Internet users. Yet, encryption can be exploited to hide malicious activities. Traditionally, network traffic inspection is based on techniques like deep packet inspection (DPI). Common applications for DPI include but are not limited to firewalls, intrusion detection and prevention systems, L7 filtering and packet forwarding. The core functionality of such DPI implementations is based on pattern matching that enables searching for specific strings or regular expressions inside the packet contents. With the widespread adoption of network encryption though, DPI tools that rely on packet payload content are becoming less effective, demanding the development of more sophisticated techniques in order to adapt to current network encryption trends. In this work, we present HeaderHunter, a fast signature-based intrusion detection system even in encrypted network traffic. We generate signatures using only network packet metadata extracted from packet headers. Also, to cope with the ever increasing network speeds, we accelerate the inner computations of our proposed system using off-the-shelf GPUs.

Services

Statistics