Visible to the public Head(er)Hunter: Fast Intrusion Detection using Packet Metadata Signatures

TitleHead(er)Hunter: Fast Intrusion Detection using Packet Metadata Signatures
Publication TypeConference Paper
Year of Publication2020
AuthorsPapadogiannaki, E., Deyannis, D., Ioannidis, S.
Conference Name2020 IEEE 25th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)
Keywordscomputer network security, cryptographic protocols, cryptography, current network encryption trends, deep packet inspection, digital signatures, DPI implementations, DPI tools, encrypted network traffic, encryption protocols, Engines, fast intrusion detection, fast signature-based intrusion detection system, Internet, Internet traffic, Internet users, Intrusion detection, malicious activities, metadata, network packet metadata, network speeds, network traffic inspection, packet contents, packet forwarding, packet headers, packet metadata signatures, packet payload content, Pattern matching, Payloads, prevention systems, Protocols, pubcrawl, Resiliency, Scalability, telecommunication traffic
AbstractMore than 75% of the Internet traffic is now encrypted, while this percentage is constantly increasing. The majority of communications are secured using common encryption protocols such as SSL/TLS and IPsec to ensure security and protect the privacy of Internet users. Yet, encryption can be exploited to hide malicious activities. Traditionally, network traffic inspection is based on techniques like deep packet inspection (DPI). Common applications for DPI include but are not limited to firewalls, intrusion detection and prevention systems, L7 filtering and packet forwarding. The core functionality of such DPI implementations is based on pattern matching that enables searching for specific strings or regular expressions inside the packet contents. With the widespread adoption of network encryption though, DPI tools that rely on packet payload content are becoming less effective, demanding the development of more sophisticated techniques in order to adapt to current network encryption trends. In this work, we present HeaderHunter, a fast signature-based intrusion detection system even in encrypted network traffic. We generate signatures using only network packet metadata extracted from packet headers. Also, to cope with the ever increasing network speeds, we accelerate the inner computations of our proposed system using off-the-shelf GPUs.
DOI10.1109/CAMAD50429.2020.9209308
Citation Keypapadogiannaki_headerhunter_2020