Head(er)Hunter: fast intrusion detection using packet metadata signaturesHead(er)Hunter: fast intrusion detection using packet metadata signatures Δημοσίευση σε Συνέδριο Conference Publication 2022-05-032020enThis work was supported by the projects CONCORDIA, CyberSANE, I-BIDAAS and SPIDER, funded by the European Commission under Grant Agreements No. 830927, No. 833683, No. 780787 and No. 833685. This research work was also supported by the Hellenic Foundation for Research and Innovation (HFRI) and the General Secretariat for Research and Technology (GSRT), under the HFRI PhD Fellowship grant (GA. No. 2767).More than 75% of the Internet traffic is now encrypted, while this percentage is constantly increasing. The majority of communications are secured using common encryption protocols such as SSL/TLS and IPsec to ensure security and protect the privacy of Internet users. Yet, encryption can be exploited to hide malicious activities. Traditionally, network traffic inspection is based on techniques like deep packet inspection (DPI). Common applications for DPI include but are not limited to firewalls, intrusion detection and prevention systems, L7 filtering and packet forwarding. The core functionality of such DPI implementations is based on pattern matching that enables searching for specific strings or regular expressions inside the packet contents. With the widespread adoption of network encryption though, DPI tools that rely on packet payload content are becoming less effective, demanding the development of more sophisticated techniques in order to adapt to current network encryption trends. In this work, we present HeaderHunter, a fast signature-based intrusion detection system even in encrypted network traffic. We generate signatures using only network packet metadata extracted from packet headers. Also, to cope with the ever increasing network speeds, we accelerate the inner computations of our proposed system using off-the-shelf GPUs.http://creativecommons.org/licenses/by/4.0/1-62020 IEEE 25th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks Papadogiannaki Eva Deyannis Dimitris Ioannidis Sotirios Ιωαννιδης Σωτηριος Institute of Electrical and Electronics Engineers Payloads Cryptography Pattern matching Intrusion detection Metadata Engines Protocols