Assessment of Deep Packet Inspection System of Network traffic and Anomaly Detection
DOI:
https://doi.org/10.32628/IJSRSET23103108Keywords:
Deep packet SSL inspection, decrypting, inspecting, SSL encrypted, network traffic.Abstract
Deep packet SSL inspection is a process that involves decrypting and inspecting SSL encrypted network traffic in order to detect and prevent security threats. With the increasing use of SSL encryption, it has become difficult for traditional network security solutions to inspect encrypted traffic for threats. Deep packet SSL inspection addresses this problem by decrypting the SSL traffic, inspecting it for threats, and then re-encrypting it before forwarding it to its destination. This process involves the use of SSL certificates that mimic the real ones used by the servers, as well as SSL inspection rules that specify which traffic should be decrypted and inspected. Deep packet SSL inspection can be a complex and resource- intensive process, and must be performed carefully to avoid legal or ethical issues related to the interception and inspection of encrypted traffic. However, it is a powerful tool for protecting networks from security threats, and can help organizations detect and prevent attacks that would otherwise go unnoticed.
References
- Kabir, Md Ahsanul, and Xiao Luo. "Unsupervised learning for network flow based anomaly detection in the era of deep learning." In 2020 IEEE Sixth International Conference on Big Data Computing Service and Applications (BigDataService), pp. 165-168. IEEE, 2020.
- Tang, Tuan A., Lotfi Mhamdi, Des McLernon, Syed Ali Raza Zaidi, and Mounir Ghogho. "Deep learning approach for network intrusion detection in software defined networking." In 2016 international conference on wireless networks and mobile communications (WINCOM), pp. 258-263. IEEE, 2016.
- Potluri, Sasanka, and Christian Diedrich. "Accelerated deep neural networks for enhanced intrusion detection system." In 2016 IEEE 21st international conference on emerging technologies and factory automation (ETFA), pp. 1-8. IEEE, 2016.
- D. Kwon, K. Natarajan, S. C. Suh, H. Kim, and J. Kim, “An empirical study on network anomaly detection using convolutional neural networks,” in 2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS). IEEE, 2018, pp. 1595–1598
- Kim, Jihyun, Jaehyun Kim, Huong Le Thi Thu, and Howon Kim. "Long short term memory recurrent neural network classifier for intrusion detection." In 2016 international conference on platform technology and service (PlatCon), pp. 1-5. IEEE, 2016.
- Stewart, Barnaby, Luis Rosa, Leandros A. Maglaras, Tiago J. Cruz, Mohamed Amine Ferrag, Paulo Simoes, and Helge Janicke. "A novel intrusion detection mechanism for scada systems which automatically adapts to network topology changes." EAI Endorsed Transactions on Industrial Networks and Intelligent Systems 4, no. 10 (2017).
- C. Yin, Y. Zhu, J. Fei, and X. He, “A deep learning approach for intrusion detection using recurrent neural networks,” Ieee Access, vol. 5, pp. 21 954–21 961, 2017.
- Iglesias, F., Zseby, T. Analysis of network traffic features for anomaly detection. Mach Learn 101, 59–84 (2015). https://doi.org/10.1007/s10994-014-5473-9 .
- Benjamin J. Radford, Leonardo M. Apolonio, Antonio J. Trias, and Jim A. Simpson, “Network Traffic Anomaly detection using Recurrent Neural Network”, 2018 arXiv:1803.10769.
- Raghavendra Chalapathy and Sanjay Chawla, “Deep Learning for Anomaly Detection: A Survey” 2019. arXv:1901.03407v2.
- S. Das, M. Ashrafuzzaman, F. T. Sheldon and S. Shiva, "Network Intrusion Detection using Natural Language Processing and Ensemble Machine Learning," 2020 IEEE Symposium Series on Computational Intelligence (SSCI), Canberra, ACT, Australia, 2020, pp. 829-835, doi: 10.1109/SSCI47803.2020.9308268
- Ma, Qian & Sun, Cong & Cui, Baojiang & Jin, Xiaohui. (2021). A Novel Model for Anomaly Detection in Network Traffic Based on Kernel Support Vector Machine. Computers & Security. 104. 102215. 10.1016/j.cose.2021.102215.
- Rabbani, M.; Wang, Y.; Khoshkangini, R.; Jelodar, H.; Zhao, R.; Bagheri Baba Ahmadi, S.; Ayobi, S. A Review on Machine Learning Approaches for Network Malicious Behavior Detection in Emerging Technologies. Entropy 2021, 23, 529. https://doi.org/10.3390/e23050529
- Chandola, Varun & Banerjee, Arindam & Kumar, Vipin. (2009). Anomaly Detection: A Survey. ACM Comput. Surv 41.10.1145/1541880.1541882.
- A. B. Nassif, M. A. Talib, Q. Nasir and F. M. Dakalbab, "Machine Learning for Anomaly Detection: A Systematic Review," in IEEE Access, vol. 9, pp. 78658-78700, 2021, doi: 10.1109/ACCESS.2021.3083060.
- F. Salo, M. Injadat, A. B. Nassif, A. Shami and A. Essex, "Data Mining Techniques in Intrusion Detection Systems: A Systematic Literature Review," in IEEE Access, vol. 6, pp. 56046-56058, 2018, doi:10.1109/ACCESS.2018.2872784
- Yu, Yang & Long, Jun & Cai, Zhiping. (2017). Network Intrusion Detection through Stacking Dilated Convolutional Autoencoders. Security and Communication Networks. 2017. 1-10. 10.1155/2017/4184196
- G. Kaur, V. Saxena and J. P. Gupta, "Anomaly Detection in network traffic and role of wavelets," 2010 2nd International Conference on Computer Engineering and Technology, Chengdu, China, 2010, pp. V7-46-V7-51, doi: 10.1109/ICCET.2010.5485392.
- N. H. Duong and H. Dang Hai, "A model for network traffic anomaly detection," 2016 18th International Conference on Advanced Communication Technology (ICACT), PyeongChang, Korea (South), 2016, pp. 644-650, doi: 10.1109/ICACT.2016.7423587.
- Agarwal, Basant & Mittal, Namita. (2012). Hybrid Approach for Detection of Anomaly Network Traffic using Data Mining Techniques. Procedia Technology. 6.10.1016/j.protcy.2012.10.121.
- Paul Barford, Jeffery Kline, David Plonka, and Amos Ron. 2002. A signal analysis of network traffic anomalies. In Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurment (IMW '02). Association for Computing Machinery, NewYork,NY,USA, 71–82. https://doi.org/10.1145/637201.637210
- Gu, Yu & Mccallum, Andrew & Towsley, Donald. (2005). Detecting Anomalies in Network Traffic Using Maximum Entropy Estimation 345-350. 10.1145/1330107.1330148.
- M. H. Bhuyan, D. K. Bhattacharyya and J.K. Kalita, "Network Anomaly Detection: Methods, Systems and Tools," in IEEE Communications Surveys & Tutorials, vol. 16, no. 1, pp. 303-336, First Quarter 2014, doi: 10.1109/SURV.2013.052213.00046.
- Do, ChoXuan & Dam, Nguyen & Lam, Nguyen. (2021). Optimization of network traffic anomaly detection using machine learning. International Journal of Electrical and Computer Engineering(IJECE). 11.2360.10.11591/ijece.v11i3.pp2360-2370.
- Jungsuk Song, Hiroki Takakura, Yasuo Okabe, Koji Nakao, ”Toward a more practical unsupervised anomaly detection system”,Information Sciences, Volume 231,2013, Pages 4-14, ISSN 0020-0255, https://doi.org/10.1016/j.ins.2011.08.011 .
- Edin Citaku, “Use case study on machine earning for network anomaly detection” in Seminar Innovative Internet Technologies and Mobile Communications Chair of Network Architectures and Services Departments of Informatics, Technical University of Munich,2018.
- Wang, Haiyan. (2015). Anomaly Detection of Network Traffic Based on Prediction and Self- Adaptive Threshold. International Journal of Future Generation Communication and Networking. 8. 205-214. 10.14257/ijfgcn.2015.8.6.20.
- Hemant Sengar, H., Wang, X., Wang, H., Wijesekera, D., & Jajodia, S. (2009). Online detection of network traffic anomalies using behavioral distance. 2009 17th International Workshop on Quality of Service, 1-9.
- Nana K. Ampah, Cajetan M. Akujuobi, Mathew N.O. Sadiku and Shumon Alam, “An intrusion detection technique based on continuous binary communication channels”, November 16, 2011 pp 174-180, tps://doi.org/10.1504/IJSN.2011.043674.
- K. Steverson, C. Carlin, J. Mullin and M. Ahiskali, "Cyber Intrusion Detection using Natural Language Processing on Windows Event Logs," 2021 International Conference on Military Communication and Information Systems (ICMCIS), The Hague, Netherlands, 2021, pp. 1-7, doi: 10.1109/ICMCIS52405.2021.9486307.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRSET

This work is licensed under a Creative Commons Attribution 4.0 International License.