Published September 17, 2019 | Version v1
Poster Open

GPU-accelerated encrypted network traffic inspection

  • 1. Foundation for Research and Technology - Institute of Computer Science (FORTH - ICS), Hellas

Description

Statistics show that more than 60% of the Internet traffic is now encrypted, while this percentage is constantly increasing. The majority of communications are secured using common encryption protocols such as SSL/TLS and IPsec in order to ensure security and protect the privacy of Internet users. Traditionally, Internet traffic analysis and monitoring is based on techniques like deep packet inspection (DPI). The core functionality of such DPI implementations is based on pattern matching, that enables searching for specific strings or regular expressions inside the packet contents. Common applications of DPI include but are not limited to firewalls, intrusion detection and prevention systems, L7 filtering and packet forwarding. With the widespread adoption of network encryption though, DPI tools that rely on packet content are becoming less effective, demanding the development of more sophisticated techniques in order not to become obsolete. Traditional DPI implementations can only extract very coarse-grained information for the majority of encrypted traffic, even though its analysis is a core operation for many network systems. Apparently, network inspection systems need to be improved and adapted to current encryption trends.

An approach to inspect encrypted network traffic is the generation of signatures based on packet metadata, such as the packet timestamp, size and direction. These metadata can be usable even with encrypted traffic, since they can be easily extracted from packet headers. Recent related work has proven that revealing the traffic nature in encrypted communication channels is feasible. For instance, Conti et al. proposed a system to analyse encrypted network traffic to identify user actions on Android devices, such as email exchange, interactions over social network, etc [3]. Their framework leverages information that is available in TCP/IP packets, like IP addresses and ports, among with other features, like packet size, direction and timing. Using machine learning techniques, they conduct their experiments that show that the system can achieve accuracy and precision higher than 95% for a number of user actions. Papadogiannaki et al. proposed a pattern language to describe packet trains for fine-grained identification of applicationlevel events in encrypted network traffic. They provided an efficient implementation of this language, namely OTTer, based on an extended version of the Aho-Corasick algorithm [4]. This approach is tested against real traffic and presents a minor CPU overhead when integrated with a proprietary DPI engine. Current solutions that focus on detecting malicious network traffic include Symantec’s Encrypted Traffic Management (ETM) and Cisco’s Encrypted Traffic Analytics (ETA) tools. ETM gains visibility into encrypted traffic to stop threats. Yet, this approach could violate user privacy since traffic is decrypted using SSL visibility appliances [2]. ETA uses a more sophisticated technique that combines many different features of traffic. Still, this solution remains proprietary [1].

In this work, we investigate the utilization of hardware accelerators, such as GPGPUs, for high performance metadata matching against network traffic. The benefits for such an implementation is the high processing throughput as well as the low cost of powerful commodity high-end GPUs (in contrast to expensive server setups) [5]. Since GPUs offer stream processing, real-time traffic inspection can be achieved. Fast metadata matching can enhance the implementation of numerous applications tailored for encrypted networks, such as traffic monitoring and intrusion detection. In addition, such system can be utilized by service providers for analytics extraction in order to ensure quality of service for their clients. In Figure 1 we present a high level overview of our engine. The signatures that are extracted through an analysis phase, are compiled into an Aho-Corasick automaton that enables simultaneous multi-pattern matching. The incoming network traffic is grouped into batches and then transferred to the device memory space. Our engine is able to report suspicious behaviour during the pattern matching period against incoming network traffic.

Files

womENcourage_2019_paper_21.pdf

Files (316.9 kB)

Name Size Download all
md5:26ad39b6c3cdc20470a836c66780ef8a
316.9 kB Preview Download

Additional details

Funding

European Commission
I-BiDaaS - Industrial-Driven Big Data as a Self-Service Solution 780787