Title :
Two-Level Packet Inspection Using Sequential Differentiate Method
Author :
Raja, N. Kannaiya ; Arulanandam, K. ; Rajeswari, B. Raja
Author_Institution :
Dept. of CSE, Arulmigu Meenakshi Amman Coll. of Eng., Thiruvannamalai, India
Abstract :
Deep Packet Inspection is a vital task in network security applications such as Firewalls and Intrusion Detection Systems (IDS). Patterns based detectors used in Packet Inspection implement multi-pattern matching algorithms to check whether the packet payload have a specified patterns in a patterns set. Computational cost is one of the major concerns of the commercial Intrusion Detection Systems (IDSs). Although these systems are proven to be promising in detecting network abnormalities, they need to check all the patterns to identify a suspicious abnormal in the worst case. This is time consuming. This paper proposes an efficient two-level IDS, which applies a statistical patterns approach and a Sequential Differentiate Method (SeqDM) for the detection of unauthorized packets. The two-level system converts high-faceted character space into a low-faceted character space. It is able to reduce the computational cost and integrates groups of patterns into an identical patterns. The integration of patterns reduces the cost involved for valid packet identification. The final decision is made on the integrated low-faceted character space. Finally, the proposed two-level system is evaluated using DARPA 1999 IDS dataset for the detection of unauthorized packets.
Keywords :
Internet; computer network security; inspection; pattern matching; statistical analysis; Internet; SeqDM; deep packet inspection; firewalls; high-faceted character space; integrated low-faceted character space; intrusion detection systems; multipattern matching algorithms; network security; packet identification; pattern based detectors; sequential differentiate method; statistical pattern approach; two-level IDS; two-level packet inspection; unauthorized packet detection; Algorithm design and analysis; Computational modeling; Detectors; Inspection; Intrusion detection; Pattern matching; Payloads; Intrusion detection; Network Security; Packet inspection; Pattern matching;
Conference_Titel :
Advances in Computing and Communications (ICACC), 2012 International Conference on
Conference_Location :
Cochin, Kerala
Print_ISBN :
978-1-4673-1911-9
DOI :
10.1109/ICACC.2012.10