Performance Improvement of Deep Packet Inspection for Intrusion Detection

被引:0
作者
Parvat, Thaksen J. [1 ]
Chandra, Pravin [1 ]
机构
[1] GGS Indratrastha Univ Dwarka, USICT, USET, New Delhi 78, India
来源
2014 IEEE GLOBAL CONFERENCE ON WIRELESS COMPUTING AND NETWORKING (GCWCN) | 2014年
关键词
Deep Packet Inspection; Intrusion Detection; Security; Performance; Accuracy;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The development in anomaly and misuse detection in this decade is crucial as web services grow vast. Managing secure network is a challenge today. The objectives vary according to the infrastructure management and security policy. There are various ways to check stateful packet inspection and Deep Packet inspection (DPI). Identify payload traffic using DPI, Network security, Privacy and QoS. The functions of DPI are protocol detection, anti-virus, anti-malware and Intrusion Detection System (IDS). The detection engine may support by a signatures or heuristics. Most of the algorithms do training and testing, it takes approximately double time. The paper suggests a new model to improve performance of Intrusion detection system by using in/out based attributes of records. It takes a comparative less time and good accuracy than the existing classifiers.
引用
收藏
页码:224 / 228
页数:5
相关论文
共 14 条
  • [1] [Anonymous], 2001, PROC 18 INT C MACH L
  • [2] Eason G., 1995, PHILOS T R SOC A, VA247
  • [3] Gu Y., 2005, P INTERNET MEASUREME, P345, DOI 10.1145/1330107.1330148
  • [4] Kahtani A., 2012, ELSEVIER J NETWORK C, V33, P6
  • [5] Kannaiya Raja N., 2012, IEEE 2012 INT C ADV
  • [6] Kawano Shinya, HIGH SPEED DPI METHO
  • [7] MU Cheng, 2013, CHINA COMMUNICAT NOV
  • [8] Deep packet inspection and bandwidth management: Battles over BitTorrent in Canada and the United States
    Mueller, Milton L.
    Asghari, Hadi
    [J]. TELECOMMUNICATIONS POLICY, 2012, 36 (06) : 462 - 475
  • [9] Olusola Adetunmbi A., WCECS 2010
  • [10] A fast string search algorithm for deep packet classification
    Rafiq, ANME
    El-Kharashi, MW
    Gebali, F
    [J]. COMPUTER COMMUNICATIONS, 2004, 27 (15) : 1524 - 1538