Fast Packet Inspection for End-To-End Encryption

With the recent development and popularization of various network technologies, communicating with people at any time, and from any location, using high-speed internet, has become easily accessible. At the same time, eavesdropping, data interception, personal data leakage, and distribution of malwar...

Full description

Bibliographic Details
Main Authors: So-Yeon Kim, Sun-Woo Yun, Eun-Young Lee, So-Hyeon Bae, Il-Gu Lee
Format: Article
Language:English
Published: MDPI AG 2020-11-01
Series:Electronics
Subjects:
Online Access:https://www.mdpi.com/2079-9292/9/11/1937
_version_ 1797547660596477952
author So-Yeon Kim
Sun-Woo Yun
Eun-Young Lee
So-Hyeon Bae
Il-Gu Lee
author_facet So-Yeon Kim
Sun-Woo Yun
Eun-Young Lee
So-Hyeon Bae
Il-Gu Lee
author_sort So-Yeon Kim
collection DOAJ
description With the recent development and popularization of various network technologies, communicating with people at any time, and from any location, using high-speed internet, has become easily accessible. At the same time, eavesdropping, data interception, personal data leakage, and distribution of malware during the information transfer process have become easier than ever. Recently, to respond to such threats, end-to-end encryption (E2EE) technology has been widely implemented in commercial network services as a popular information security system. However, with the use of E2EE technology, it is difficult to check whether an encrypted packet is malicious in an information security system. A number of studies have been previously conducted on deep packet inspection (DPI) through trustable information security systems. However, the E2EE is not maintained when conducting a DPI, which requires a long inspection time. Thus, in this study, a fast packet inspection (FPI) and its frame structure for quickly detecting known malware patterns while maintaining E2EE are proposed. Based on the simulation results, the proposed FPI allows for inspecting packets approximately 14.4 and 5.3 times faster, respectively, when the inspection coverage is 20% and 100%, as compared with a DPI method under a simulation environment in which the payload length is set to 640 bytes.
first_indexed 2024-03-10T14:47:16Z
format Article
id doaj.art-ea1edd3be73543a9989382deaa30e66d
institution Directory Open Access Journal
issn 2079-9292
language English
last_indexed 2024-03-10T14:47:16Z
publishDate 2020-11-01
publisher MDPI AG
record_format Article
series Electronics
spelling doaj.art-ea1edd3be73543a9989382deaa30e66d2023-11-20T21:18:44ZengMDPI AGElectronics2079-92922020-11-01911193710.3390/electronics9111937Fast Packet Inspection for End-To-End EncryptionSo-Yeon Kim0Sun-Woo Yun1Eun-Young Lee2So-Hyeon Bae3Il-Gu Lee4Department of Convergence Security Engineering, Sungshin University, Seoul 02844, KoreaDepartment of Future Convergence Technology Engineering, Sungshin University, Seoul 02844, KoreaDepartment of Convergence Security Engineering, Sungshin University, Seoul 02844, KoreaDepartment of Convergence Security Engineering, Sungshin University, Seoul 02844, KoreaDepartment of Future Convergence Technology Engineering, Sungshin University, Seoul 02844, KoreaWith the recent development and popularization of various network technologies, communicating with people at any time, and from any location, using high-speed internet, has become easily accessible. At the same time, eavesdropping, data interception, personal data leakage, and distribution of malware during the information transfer process have become easier than ever. Recently, to respond to such threats, end-to-end encryption (E2EE) technology has been widely implemented in commercial network services as a popular information security system. However, with the use of E2EE technology, it is difficult to check whether an encrypted packet is malicious in an information security system. A number of studies have been previously conducted on deep packet inspection (DPI) through trustable information security systems. However, the E2EE is not maintained when conducting a DPI, which requires a long inspection time. Thus, in this study, a fast packet inspection (FPI) and its frame structure for quickly detecting known malware patterns while maintaining E2EE are proposed. Based on the simulation results, the proposed FPI allows for inspecting packets approximately 14.4 and 5.3 times faster, respectively, when the inspection coverage is 20% and 100%, as compared with a DPI method under a simulation environment in which the payload length is set to 640 bytes.https://www.mdpi.com/2079-9292/9/11/1937end-to-end encryption (E2EE)packet inspectionintegritymalware detectionsecurityconfidentiality
spellingShingle So-Yeon Kim
Sun-Woo Yun
Eun-Young Lee
So-Hyeon Bae
Il-Gu Lee
Fast Packet Inspection for End-To-End Encryption
Electronics
end-to-end encryption (E2EE)
packet inspection
integrity
malware detection
security
confidentiality
title Fast Packet Inspection for End-To-End Encryption
title_full Fast Packet Inspection for End-To-End Encryption
title_fullStr Fast Packet Inspection for End-To-End Encryption
title_full_unstemmed Fast Packet Inspection for End-To-End Encryption
title_short Fast Packet Inspection for End-To-End Encryption
title_sort fast packet inspection for end to end encryption
topic end-to-end encryption (E2EE)
packet inspection
integrity
malware detection
security
confidentiality
url https://www.mdpi.com/2079-9292/9/11/1937
work_keys_str_mv AT soyeonkim fastpacketinspectionforendtoendencryption
AT sunwooyun fastpacketinspectionforendtoendencryption
AT eunyounglee fastpacketinspectionforendtoendencryption
AT sohyeonbae fastpacketinspectionforendtoendencryption
AT ilgulee fastpacketinspectionforendtoendencryption