Abstract
In our modern society the reliance on fast and reliable delivery of large amounts of data is steadily growing as more and more companies and public bodies use data analytics to support their decision processes. At the same time, the rise of the Internet of Things introduces into the public cyberspace a multitude of devices that are often ill-suited to implement strong security measures. For this reason, it is of paramount importance that the whole Internet traffic is fully sanitized from any malicious packet before it is delivered to the destination. Past work has proved that this compelling security requirement may be leveraged to implement an aggressive intrusion detection that may lead to energy savings in the network; however it may also negatively impact latency sensitive applications as the need to scrutinize all the packets may cause latency sensitive traffic to incur unwanted delays beyond the time needed to analyze it for security sake. In this paper, we describe a methodology that, while guaranteeing a full sanitization of the Internet traffic, allows reducing its impact on the delay introduced in latency sensitive traffic.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Ponemon Cost of Data Breach Study (2016). https://www-03.ibm.com/security/data-breach/. Last accessed 12 Apr 2017
Yahoo’s data breach is one of the biggest in history. http://www.businessinsider.com/yahoo-hack-data-breach-how-big-chart-2016-9?IR=T. Last accessed 13 Apr 2017
Lord, N.: The History of Data Breaches. https://digitalguardian.com/blog/history-data-breaches. Last accessed 12 Apr 2017
Findings from the 2016 breach level index. http://breachlevelindex.com/assets/Breach-Level-Index-Report-2016-Gemalto.pdf. Last accessed 12 Apr 2017
Jerkins, J.A.: Motivating a market or regulatory solution to IoT insecurity with the Mirai botnet code. In: 2017 IEEE 7th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, pp. 1–5 (2017). doi:10.1109/CCWC.2017.7868464
Q4 2016 State of the Internet/Security Report. https://www.akamai.com/us/en/about/our-thinking/state-of-the-Internet-report/global-state-of-the-Internet-security-ddos-attack-reports.jsp. Last accessed 13 Apr 2017
Ring, M., Dürrwang, J., Sommer, F., Kriesten, R.: Survey on vehicular attacks - building a vulnerability database. In: 2015 IEEE International Conference on Vehicular Electronics and Safety (ICVES), Yokohama, pp. 208–212 (2015). doi:10.1109/ICVES.2015.7396919
Merlo, A., Migliardi, M., Caviglione, L.: A survey on energy-aware security mechanisms. Pervasive Mob. Comput. 24, 77–90 (2015). doi:10.1016/j.pmcj.2015.05.005
Lan, K.C., Hussain, A., Dutta, D.: Effect of malicious traffic on the network. In: Proceedings of PAM 2003, San Diego, California, April 2003
Mallikarjunan, K.N., Muthupriya, K., Shalinie, S.M.: A survey of distributed denial of service attack. In: 2016 10th International Conference on Intelligent Systems and Control (ISCO), pp. 1–6, January 2016
Merlo, A., Migliardi, M., Spadacini, E.: IPS-based reduction of network energy consumption. Logic J. IGPL (in press). doi:10.1093/jigpal/jzw053
Netflix and Youtube grab 50% of peak Internet traffic, p2p fades into the sunset. http://www.digitaltrends.com/home-theater/netflix-youtube-grab-50-peak-Internet-traffic-peer-peer-fades-sunset/. Last accessed 13 Apr 2017
White paper: Cisco VNI Forecast and Methodology, 2015–2020. https://www.cisco.com/c/en/us/solutions/collateral/service-provider/visual-networking-index-vni/complete-white-paper-c11-481360.html. Last accessed 13 Apr 2017
Das, S., Parulkar, G., McKeown, N.: Rethinking IP core networks. IEEE/OSA J. Opt. Commun. Networking 5(12), 1431–1442 (2013). doi:10.1364/JOCN.5.001431
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this paper
Cite this paper
Migliardi, M., Merlo, A., Baddar, S.AH. (2018). Reducing the Impact of Traffic Sanitization on Latency Sensitive Applications. In: Barolli, L., Terzo, O. (eds) Complex, Intelligent, and Software Intensive Systems. CISIS 2017. Advances in Intelligent Systems and Computing, vol 611. Springer, Cham. https://doi.org/10.1007/978-3-319-61566-0_96
Download citation
DOI: https://doi.org/10.1007/978-3-319-61566-0_96
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-61565-3
Online ISBN: 978-3-319-61566-0
eBook Packages: EngineeringEngineering (R0)