Skip to main content

Reducing the Impact of Traffic Sanitization on Latency Sensitive Applications

  • Conference paper
  • First Online:
Complex, Intelligent, and Software Intensive Systems (CISIS 2017)

Abstract

In our modern society the reliance on fast and reliable delivery of large amounts of data is steadily growing as more and more companies and public bodies use data analytics to support their decision processes. At the same time, the rise of the Internet of Things introduces into the public cyberspace a multitude of devices that are often ill-suited to implement strong security measures. For this reason, it is of paramount importance that the whole Internet traffic is fully sanitized from any malicious packet before it is delivered to the destination. Past work has proved that this compelling security requirement may be leveraged to implement an aggressive intrusion detection that may lead to energy savings in the network; however it may also negatively impact latency sensitive applications as the need to scrutinize all the packets may cause latency sensitive traffic to incur unwanted delays beyond the time needed to analyze it for security sake. In this paper, we describe a methodology that, while guaranteeing a full sanitization of the Internet traffic, allows reducing its impact on the delay introduced in latency sensitive traffic.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ponemon Cost of Data Breach Study (2016). https://www-03.ibm.com/security/data-breach/. Last accessed 12 Apr 2017

  2. Yahoo’s data breach is one of the biggest in history. http://www.businessinsider.com/yahoo-hack-data-breach-how-big-chart-2016-9?IR=T. Last accessed 13 Apr 2017

  3. Lord, N.: The History of Data Breaches. https://digitalguardian.com/blog/history-data-breaches. Last accessed 12 Apr 2017

  4. Findings from the 2016 breach level index. http://breachlevelindex.com/assets/Breach-Level-Index-Report-2016-Gemalto.pdf. Last accessed 12 Apr 2017

  5. Jerkins, J.A.: Motivating a market or regulatory solution to IoT insecurity with the Mirai botnet code. In: 2017 IEEE 7th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, pp. 1–5 (2017). doi:10.1109/CCWC.2017.7868464

  6. Q4 2016 State of the Internet/Security Report. https://www.akamai.com/us/en/about/our-thinking/state-of-the-Internet-report/global-state-of-the-Internet-security-ddos-attack-reports.jsp. Last accessed 13 Apr 2017

  7. Ring, M., Dürrwang, J., Sommer, F., Kriesten, R.: Survey on vehicular attacks - building a vulnerability database. In: 2015 IEEE International Conference on Vehicular Electronics and Safety (ICVES), Yokohama, pp. 208–212 (2015). doi:10.1109/ICVES.2015.7396919

  8. Merlo, A., Migliardi, M., Caviglione, L.: A survey on energy-aware security mechanisms. Pervasive Mob. Comput. 24, 77–90 (2015). doi:10.1016/j.pmcj.2015.05.005

    Article  Google Scholar 

  9. Lan, K.C., Hussain, A., Dutta, D.: Effect of malicious traffic on the network. In: Proceedings of PAM 2003, San Diego, California, April 2003

    Google Scholar 

  10. Mallikarjunan, K.N., Muthupriya, K., Shalinie, S.M.: A survey of distributed denial of service attack. In: 2016 10th International Conference on Intelligent Systems and Control (ISCO), pp. 1–6, January 2016

    Google Scholar 

  11. Merlo, A., Migliardi, M., Spadacini, E.: IPS-based reduction of network energy consumption. Logic J. IGPL (in press). doi:10.1093/jigpal/jzw053

  12. Netflix and Youtube grab 50% of peak Internet traffic, p2p fades into the sunset. http://www.digitaltrends.com/home-theater/netflix-youtube-grab-50-peak-Internet-traffic-peer-peer-fades-sunset/. Last accessed 13 Apr 2017

  13. White paper: Cisco VNI Forecast and Methodology, 2015–2020. https://www.cisco.com/c/en/us/solutions/collateral/service-provider/visual-networking-index-vni/complete-white-paper-c11-481360.html. Last accessed 13 Apr 2017

  14. Das, S., Parulkar, G., McKeown, N.: Rethinking IP core networks. IEEE/OSA J. Opt. Commun. Networking 5(12), 1431–1442 (2013). doi:10.1364/JOCN.5.001431

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mauro Migliardi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this paper

Cite this paper

Migliardi, M., Merlo, A., Baddar, S.AH. (2018). Reducing the Impact of Traffic Sanitization on Latency Sensitive Applications. In: Barolli, L., Terzo, O. (eds) Complex, Intelligent, and Software Intensive Systems. CISIS 2017. Advances in Intelligent Systems and Computing, vol 611. Springer, Cham. https://doi.org/10.1007/978-3-319-61566-0_96

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-61566-0_96

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-61565-3

  • Online ISBN: 978-3-319-61566-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics