Skip to main content

2021 | OriginalPaper | Buchkapitel

A Scalable, Real-Time Packet Capturing Solution

verfasst von : Rafael Oliveira, João P. Almeida, Isabel Praça, Rui Pedro Lopes, Tiago Pedrosa

Erschienen in: Optimization, Learning Algorithms and Applications

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The evolution of technology and the increasing connectivity between devices lead to an increased risk of cyberattacks. Good protection systems, such as Intrusion Detection System (IDS) and Intrusion Prevention System (IPS), are essential in trying to prevent, detect and counter most of the attacks. However, the increasing creativity and type of attacks raise the need for more resources and processing power for the protection systems which, in turn, requires horizontal scalability to keep up with the massive companies’ network infrastructure and with the complexity of attacks. Technologies like machine learning, show promising results and can be of added value in the detection and prevention of attacks in real-time. But good algorithms and tools are not enough. They require reliable and solid datasets to be able to effectively train the protection systems. The development of a good dataset requires horizontal-scalable, robust, modular and fault-tolerance systems, so that the analyses may be done also in real-time. This paper describes an architecture for horizontal-scaling capture architecture, able to collect packets from multiple sources and prepared for real-time analysis. It depends on multiple modular nodes with specific roles to support different algorithms and tools.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Cordero, C.G., Hauke, S., Muhlhauser, M., Fischer, M.: Analyzing flow-based anomaly intrusion detection using Replicator Neural Networks. In: 2016 14th Annual Conference on Privacy, Security and Trust, PST 2016, pp. 317–324. Institute of Electrical and Electronics Engineers Inc. (2016). https://doi.org/10.1109/PST.2016.7906980 Cordero, C.G., Hauke, S., Muhlhauser, M., Fischer, M.: Analyzing flow-based anomaly intrusion detection using Replicator Neural Networks. In: 2016 14th Annual Conference on Privacy, Security and Trust, PST 2016, pp. 317–324. Institute of Electrical and Electronics Engineers Inc. (2016). https://​doi.​org/​10.​1109/​PST.​2016.​7906980
3.
Zurück zum Zitat Do, E.H., Gadepally, V.N.: Classifying anomalies for network security. In: Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), May 2020, vol. 2020, pp. 2907–2911. Institute of Electrical and Electronics Engineers Inc. (May 2020). https://doi.org/10.1109/ICASSP40776.2020.9053419 Do, E.H., Gadepally, V.N.: Classifying anomalies for network security. In: Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), May 2020, vol. 2020, pp. 2907–2911. Institute of Electrical and Electronics Engineers Inc. (May 2020). https://​doi.​org/​10.​1109/​ICASSP40776.​2020.​9053419
4.
Zurück zum Zitat Emmerich, P., Pudelko, M., Gallenmüller, S., Carle, G.: FlowScope: efficient packet capture and storage in 100 Gbit/s networks. In: 2017 IFIP Networking Conference, IFIP Networking 2017 and Workshops, January 2018, vol. 2018, pp. 1–9. Institute of Electrical and Electronics Engineers Inc. (July 2017). https://doi.org/10.23919/IFIPNetworking.2017.8264852 Emmerich, P., Pudelko, M., Gallenmüller, S., Carle, G.: FlowScope: efficient packet capture and storage in 100 Gbit/s networks. In: 2017 IFIP Networking Conference, IFIP Networking 2017 and Workshops, January 2018, vol. 2018, pp. 1–9. Institute of Electrical and Electronics Engineers Inc. (July 2017). https://​doi.​org/​10.​23919/​IFIPNetworking.​2017.​8264852
5.
Zurück zum Zitat Evermann, J., Rehse, J.R., Fettke, P.: Process discovery from event stream data in the cloud - a scalable, distributed implementation of the flexible heuristics miner on the Amazon kinesis cloud infrastructure. In: Proceedings of the International Conference on Cloud Computing Technology and Science, CloudCom, pp. 645–652. IEEE Computer Society (July 2016). https://doi.org/10.1109/CloudCom.2016.0111 Evermann, J., Rehse, J.R., Fettke, P.: Process discovery from event stream data in the cloud - a scalable, distributed implementation of the flexible heuristics miner on the Amazon kinesis cloud infrastructure. In: Proceedings of the International Conference on Cloud Computing Technology and Science, CloudCom, pp. 645–652. IEEE Computer Society (July 2016). https://​doi.​org/​10.​1109/​CloudCom.​2016.​0111
15.
Zurück zum Zitat Pudukotai Dinakarrao, S.M., Sayadi, H., Makrani, H.M., Nowzari, C., Rafatirad, S., Homayoun, H.: Lightweight node-level malware detection and network-level malware confinement in IoT networks. In: Proceedings of the 2019 Design, Automation and Test in Europe Conference and Exhibition, DATE 2019, pp. 776–781. Institute of Electrical and Electronics Engineers Inc. (May 2019). https://doi.org/10.23919/DATE.2019.8715057 Pudukotai Dinakarrao, S.M., Sayadi, H., Makrani, H.M., Nowzari, C., Rafatirad, S., Homayoun, H.: Lightweight node-level malware detection and network-level malware confinement in IoT networks. In: Proceedings of the 2019 Design, Automation and Test in Europe Conference and Exhibition, DATE 2019, pp. 776–781. Institute of Electrical and Electronics Engineers Inc. (May 2019). https://​doi.​org/​10.​23919/​DATE.​2019.​8715057
17.
Zurück zum Zitat Saini, P.S., Behal, S., Bhatia, S.: Detection of DDoS attacks using machine learning algorithms. In: Proceedings of the 7th International Conference on Computing for Sustainable Global Development, INDIACom 2020, pp. 16–21. Institute of Electrical and Electronics Engineers Inc. (March 2020). https://doi.org/10.23919/INDIACom49435.2020.9083716 Saini, P.S., Behal, S., Bhatia, S.: Detection of DDoS attacks using machine learning algorithms. In: Proceedings of the 7th International Conference on Computing for Sustainable Global Development, INDIACom 2020, pp. 16–21. Institute of Electrical and Electronics Engineers Inc. (March 2020). https://​doi.​org/​10.​23919/​INDIACom49435.​2020.​9083716
Metadaten
Titel
A Scalable, Real-Time Packet Capturing Solution
verfasst von
Rafael Oliveira
João P. Almeida
Isabel Praça
Rui Pedro Lopes
Tiago Pedrosa
Copyright-Jahr
2021
DOI
https://doi.org/10.1007/978-3-030-91885-9_46

Premium Partner