Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/234526
Title: DPI based forensic analysis of network traffic using grid infrastructure
Researcher: Sharma, Jyotsna
Guide(s): Singh, Maninder
Keywords: Deep packet inspection
Forensic analysis
Grid computing
Network security
University: Thapar Institute of Engineering and Technology
Completed Date: 2016
Abstract: Security threats have evolved from simple attacks such as virus in-fections to more sophisticated ones like the Application-layer buffer overflow, DDoS, Phishing and many zero-day variants. Such threats have significantly altered the requirements for modern network security architecture. To detect and prevent these threats, a completely new kind of security system is required which is highly proactive as well as reactive. To protect a network from complex, sophisticated attacks, the security system should have the ability to learn from the behaviour of the past attacks and get prepared to thwart similar attacks or at- tacks from similar sources in the future. A quick response time for such a detection, analysis and learning system is the key to a strong and reliable security system. Intrusion Detection systems(IDS) and Intrusion Prevention Systems (IPS) monitor network and/or host activities for anomalous behaviour and react in real-time to block or prevent them. Traditional IDS/IPS use signature matching or anomaly detection techniques which work fine for known attacks but fail to detect new attacks. Another draw- back is the generation of too many false positive alerts in which the IDS mistakes legitimate traffic for an attack. An Intrusion Detection System based on Deep Packet Inspection (DPI) technology, where the appliance has the mechanism to look within the application payload of the traffic by inspecting every byte of every packet, has the ability to detect intrusions which are more difficult to detect as compared to the detection of simple attacks. The real-time monitoring of the payload at any level requires signifi- cant human and hardware resources, and does not scale to networks larger than a single workgroup. It is more practical to archive all traffic and analyze subsets as necessary. The process, also known as recon- structive traffic analysis, or network forensics, can enhance the security of the network and also be useful for the investigation of the attacks.
Pagination: xix, 179p.
URI: http://hdl.handle.net/10603/234526
Appears in Departments:Department of Computer Science and Engineering

Files in This Item:
File Description SizeFormat 
file10(references).pdfAttached File188.93 kBAdobe PDFView/Open
file11(publications).pdf52.2 kBAdobe PDFView/Open
file1(title).pdf55.16 kBAdobe PDFView/Open
file2(certificate).pdf196.82 kBAdobe PDFView/Open
file3(preliminary pages).pdf295.49 kBAdobe PDFView/Open
file4(chapter 1).pdf1.01 MBAdobe PDFView/Open
file5(chapter 2).pdf671.63 kBAdobe PDFView/Open
file6(chapter 3).pdf521.17 kBAdobe PDFView/Open
file7(chapter 4).pdf912.91 kBAdobe PDFView/Open
file8(chapter 5).pdf288.85 kBAdobe PDFView/Open
file9(chapter 6).pdf72.99 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: