• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

利用异构硬件加速加密网络流量中的入侵检测

Acceleration of Intrusion Detection in Encrypted Network Traffic Using Heterogeneous Hardware.

作者信息

Papadogiannaki Eva, Ioannidis Sotiris

机构信息

Institute of Computer Science, Foundation for Research and Technology-Hellas (FORTH), GR-70013 Heraklion, Crete, Greece.

School of Electrical and Computer Engineering, Technical University of Crete, University Campus, GR-73100 Chania, Crete, Greece.

出版信息

Sensors (Basel). 2021 Feb 6;21(4):1140. doi: 10.3390/s21041140.

DOI:10.3390/s21041140
PMID:33562000
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC7915898/
Abstract

More than 75% of Internet traffic is now encrypted, and this percentage is constantly increasing. The majority of communications are secured using common encryption protocols such as SSL/TLS and IPsec to ensure security and protect the privacy of Internet users. However, encryption can be exploited to hide malicious activities, camouflaged into normal network traffic. Traditionally, network traffic inspection is based on techniques like deep packet inspection (DPI). Common applications for DPI include but are not limited to firewalls, intrusion detection and prevention systems, L7 filtering, and packet forwarding. With the widespread adoption of network encryption though, DPI tools that rely on packet payload content are becoming less effective, demanding the development of more sophisticated techniques in order to adapt to current network encryption trends. In this work, we present HeaderHunter, a fast signature-based intrusion detection system even for encrypted network traffic. We generate signatures using only network packet metadata extracted from packet headers. In addition, we examine the processing acceleration of the intrusion detection engine using different heterogeneous hardware architectures.

摘要

现在超过75%的互联网流量都进行了加密,而且这一比例还在不断上升。大多数通信都使用SSL/TLS和IPsec等通用加密协议进行加密,以确保安全性并保护互联网用户的隐私。然而,加密可能会被用于隐藏恶意活动,伪装成正常的网络流量。传统上,网络流量检查基于深度包检测(DPI)等技术。DPI的常见应用包括但不限于防火墙、入侵检测和预防系统、L7过滤以及数据包转发。不过,随着网络加密的广泛采用,依赖数据包有效载荷内容的DPI工具正变得越来越无效,这就需要开发更复杂的技术以适应当前的网络加密趋势。在这项工作中,我们展示了HeaderHunter,这是一种即使对于加密网络流量也能快速基于特征进行入侵检测的系统。我们仅使用从数据包头部提取的网络数据包元数据来生成特征。此外,我们研究了使用不同异构硬件架构对入侵检测引擎进行处理加速的情况。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1a5c/7915898/b506cf93d33c/sensors-21-01140-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1a5c/7915898/a38b4499abb6/sensors-21-01140-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1a5c/7915898/af1c3300a5b4/sensors-21-01140-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1a5c/7915898/b88de8b009fd/sensors-21-01140-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1a5c/7915898/faad83d04e3e/sensors-21-01140-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1a5c/7915898/50d35fc6000c/sensors-21-01140-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1a5c/7915898/f195c185ef7d/sensors-21-01140-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1a5c/7915898/ba68e1d8a85a/sensors-21-01140-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1a5c/7915898/9b4886b16e3f/sensors-21-01140-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1a5c/7915898/b506cf93d33c/sensors-21-01140-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1a5c/7915898/a38b4499abb6/sensors-21-01140-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1a5c/7915898/af1c3300a5b4/sensors-21-01140-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1a5c/7915898/b88de8b009fd/sensors-21-01140-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1a5c/7915898/faad83d04e3e/sensors-21-01140-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1a5c/7915898/50d35fc6000c/sensors-21-01140-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1a5c/7915898/f195c185ef7d/sensors-21-01140-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1a5c/7915898/ba68e1d8a85a/sensors-21-01140-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1a5c/7915898/9b4886b16e3f/sensors-21-01140-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1a5c/7915898/b506cf93d33c/sensors-21-01140-g009.jpg

相似文献

1
Acceleration of Intrusion Detection in Encrypted Network Traffic Using Heterogeneous Hardware.利用异构硬件加速加密网络流量中的入侵检测
Sensors (Basel). 2021 Feb 6;21(4):1140. doi: 10.3390/s21041140.
2
Artificial Intelligence-Based Anomaly Detection Technology over Encrypted Traffic: A Systematic Literature Review.基于人工智能的加密流量异常检测技术:系统文献综述
Sensors (Basel). 2024 Jan 30;24(3):898. doi: 10.3390/s24030898.
3
Encrypted Network Traffic Analysis and Classification Utilizing Machine Learning.利用机器学习的加密网络流量分析与分类
Sensors (Basel). 2024 May 29;24(11):3509. doi: 10.3390/s24113509.
4
A Hybrid CPU/GPU Pattern-Matching Algorithm for Deep Packet Inspection.一种用于深度包检测的混合CPU/GPU模式匹配算法。
PLoS One. 2015 Oct 5;10(10):e0139301. doi: 10.1371/journal.pone.0139301. eCollection 2015.
5
A Software Deep Packet Inspection System for Network Traffic Analysis and Anomaly Detection.软件深度包检测系统在网络流量分析和异常检测中的应用。
Sensors (Basel). 2020 Mar 14;20(6):1637. doi: 10.3390/s20061637.
6
Data set and machine learning models for the classification of network traffic originators.用于网络流量源分类的数据集和机器学习模型。
Data Brief. 2022 Mar 3;41:107968. doi: 10.1016/j.dib.2022.107968. eCollection 2022 Apr.
7
Encrypted Web traffic dataset: Event logs and packet traces.加密网络流量数据集:事件日志和数据包踪迹。
Data Brief. 2022 Apr 21;42:108188. doi: 10.1016/j.dib.2022.108188. eCollection 2022 Jun.
8
Deep Learning for Encrypted Traffic Classification and Unknown Data Detection.深度学习在加密流量分类和未知数据检测中的应用。
Sensors (Basel). 2022 Oct 9;22(19):7643. doi: 10.3390/s22197643.
9
A two-stage flow-based intrusion detection model for next-generation networks.一种用于下一代网络的基于两阶段流的入侵检测模型。
PLoS One. 2018 Jan 12;13(1):e0180945. doi: 10.1371/journal.pone.0180945. eCollection 2018.
10
Deep Encrypted Traffic Detection: An Anomaly Detection Framework for Encryption Traffic Based on Parallel Automatic Feature Extraction.深度加密流量检测:一种基于并行自动特征提取的加密流量异常检测框架。
Comput Intell Neurosci. 2023 Mar 10;2023:3316642. doi: 10.1155/2023/3316642. eCollection 2023.

引用本文的文献

1
Multivariable Heuristic Approach to Intrusion Detection in Network Environments.网络环境中入侵检测的多变量启发式方法。
Entropy (Basel). 2021 Jun 19;23(6):776. doi: 10.3390/e23060776.

本文引用的文献

1
Deep Learning Based Intrusion Detection With Adversaries.基于深度学习的对抗性入侵检测
IEEE Access. 2018;6. doi: 10.1109/access.2018.2854599.