A Policy Based Framework for Privacy-Respecting Deep Packet Inspection of High Velocity Network Traffic
Title | A Policy Based Framework for Privacy-Respecting Deep Packet Inspection of High Velocity Network Traffic |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | Renjan, Arya, Narayanan, Sandeep Nair, Joshi, Karuna Pande |
Conference Name | 2019 IEEE 5th Intl Conference on Big Data Security on Cloud (BigDataSecurity), IEEE Intl Conference on High Performance and Smart Computing, (HPSC) and IEEE Intl Conference on Intelligent Data and Security (IDS) |
Publisher | IEEE |
ISBN Number | 978-1-7281-0006-7 |
Keywords | Access Control, access decision, active proxying, attribute based access control, Attribute-based Access Control (ABAC), big-data problem, computer network security, critical requirement, cryptography, data privacy, decryption, deep packet inspection, DPI analysis, DPI tools, fully encrypted data-transfer, high velocity network traffic, Human Behavior, Internet, malicious activity, Network connections, network payloads, organizational policies, passive proxying, Perfect Forward Secrecy, policy based framework, privacy, Privacy Policies, Privacy Requirements, privacy-aware techniques, privacy-respecting Deep Packet Inspection, pubcrawl, Scalability, security solutions, semantic technologies, telecommunication traffic, TLS 1.3, unencrypted payloads, user access privileges |
Abstract | Deep Packet Inspection (DPI) is instrumental in investigating the presence of malicious activity in network traffic and most existing DPI tools work on unencrypted payloads. As the internet is moving towards fully encrypted data-transfer, there is a critical requirement for privacy-aware techniques to efficiently decrypt network payloads. Until recently, passive proxying using certain aspects of TLS 1.2 were used to perform decryption and further DPI analysis. With the introduction of TLS 1.3 standard that only supports protocols with Perfect Forward Secrecy (PFS), many such techniques will become ineffective. Several security solutions will be forced to adopt active proxying that will become a big-data problem considering the velocity and veracity of network traffic involved. We have developed an ABAC (Attribute Based Access Control) framework that efficiently supports existing DPI tools while respecting user's privacy requirements and organizational policies. It gives the user the ability to accept or decline access decision based on his privileges. Our solution evaluates various observed and derived attributes of network connections against user access privileges using policies described with semantic technologies. In this paper, we describe our framework and demonstrate the efficacy of our technique with the help of use-case scenarios to identify network connections that are candidates for Deep Packet Inspection. Since our technique makes selective identification of connections based on policies, both processing and memory load at the gateway will be reduced significantly. |
URL | https://ieeexplore.ieee.org/document/8818977 |
DOI | 10.1109/BigDataSecurity-HPSC-IDS.2019.00020 |
Citation Key | renjan_policy_2019 |
- privacy-respecting Deep Packet Inspection
- network payloads
- organizational policies
- passive proxying
- Perfect Forward Secrecy
- policy based framework
- privacy
- Privacy Policies
- Privacy Requirements
- privacy-aware techniques
- Network connections
- pubcrawl
- Scalability
- security solutions
- semantic technologies
- telecommunication traffic
- TLS 1.3
- unencrypted payloads
- user access privileges
- decryption
- access decision
- active proxying
- attribute based access control
- Attribute-based Access Control (ABAC)
- big-data problem
- computer network security
- critical requirement
- Cryptography
- data privacy
- Access Control
- deep packet inspection
- DPI analysis
- DPI tools
- fully encrypted data-transfer
- high velocity network traffic
- Human behavior
- internet
- malicious activity