Evaluating Deep Packet Inspection in Large-scale Data Processing

被引:0
作者
Angiulli, Fabrizio [1 ]
Furfaro, Angelo [1 ]
Sacca, Domenico [1 ]
Sacco, Ludovica [1 ]
机构
[1] Univ Calabria, DIMES, Arcavacata Di Rende, CS, Italy
来源
2022 9TH INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD, FICLOUD | 2022年
关键词
big data; cyber security; deep packet inspection; IDS;
D O I
10.1109/FiCloud57274.2022.00010
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The Internet has evolved to the point that gigabytes and even terabytes of data are generated and processed on a daily basis. Such a stream of data is characterised by high volume, velocity and variety and is referred to as Big Data. Traditional data processing tools can no longer be used to process big data, because they were not designed to handle such a massive amount of data. This problem concerns also cyber security, where tools like intrusion detection systems employ classification algorithms to analyse the network traffic. Achieving a high accuracy attack detection becomes harder when the amount of data increases and the algorithms must be efficient enough to keep up with the throughput of a huge data stream. Due to the challenges posed by a big data environment, some monitoring systems have already shifted from deep packet inspection to flow-level inspection. The goal of this paper is to evaluate the applicability of an existing intrusion detection technique that performs deep packet inspection in a big data setting. We have conducted several experiments with Apache Spark to assess the performance of the technique when classifying anomalous packets, showing that it benefits from the use of Spark.
引用
收藏
页码:16 / 23
页数:8
相关论文
共 33 条
[1]  
Ahmad Z., 2020, Transactions on Emerging Telecommunications Technologies, V32
[2]   Exploiting Content Spatial Distribution to Improve Detection of Intrusions [J].
Angiulli, Fabrizio ;
Argento, Luciano ;
Furfaro, Angelo .
ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2018, 18 (02)
[3]   Apache Spark and MLlib-Based Intrusion Detection System or How the Big Data Technologies Can Secure the Data [J].
Azeroual, Otmane ;
Nikiforova, Anastasija .
INFORMATION, 2022, 13 (02)
[4]  
Boggs Nathaniel, 2014, Research in Attacks, Intrusions and Defenses. 17th International Symposium (RAID 2014). Proceedings: LNCS 8688, P234, DOI 10.1007/978-3-319-11379-1_12
[5]   Mapreduce: Simplified data processing on large clusters [J].
Dean, Jeffrey ;
Ghemawat, Sanjay .
COMMUNICATIONS OF THE ACM, 2008, 51 (01) :107-113
[6]  
Domo, 2021, Data never sleeps 9.0
[7]  
Fogla P, 2006, USENIX ASSOCIATION PROCEEDINGS OF THE 15TH USENIX SECURITY SYMPOSIUM, P241
[8]   A Framework for Fast and Efficient Cyber Security Network Intrusion Detection using Apache Spark [J].
Gupta, Govind P. ;
Kulariya, Manish .
PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING AND COMMUNICATIONS, 2016, 93 :824-831
[9]  
HajKacem M. A. B., 2021, Spark Based Intrusion Detection System Using Practical Swarm Optimization Clustering, P197
[10]   Knowledge Discovery from Big Data for Intrusion Detection Using LDA [J].
Huang, Jingwei ;
Kalbarczyk, Zbigniew ;
Nicol, David M. .
2014 IEEE INTERNATIONAL CONGRESS ON BIG DATA (BIGDATA CONGRESS), 2014, :760-761