Efficient processing of multi-connection compressed web traffic

Y Afek, A Bremler-Barr, Y Koral - … 2011: 10th International IFIP TC 6 …, 2011 - Springer
Compressing web traffic using standard GZIP is becoming both popular and challenging
due to the huge increase in wireless web devices, where bandwidth is limited. Security and …

Space efficient deep packet inspection of compressed web traffic

Y Afek, A Bremler-Barr, Y Koral - Computer Communications, 2012 - Elsevier
In this paper we focus on the process of deep packet inspection of compressed web traffic.
The major limiting factor in this process imposed by the compression, is the high memory …

Shift-based pattern matching for compressed web traffic

A Bremler-Barr, Y Koral, V Zigdon - 2011 IEEE 12th …, 2011 - ieeexplore.ieee.org
Compressing web traffic using standard GZIP is becoming both popular and challenging
due to the huge increase in wireless web devices, where bandwidth is limited. Security and …

Decompression-free inspection: Dpi for shared dictionary compression over http

A Bremler-Barr, ST David, D Hay… - 2012 Proceedings IEEE …, 2012 - ieeexplore.ieee.org
Deep Packet Inspection (DPI) is the most time and resource consuming procedure in
contemporary security tools such as Network Intrusion Detection/Prevention System …

Accelerating multipattern matching on compressed http traffic

A Bremler-Barr, Y Koral - IEEE/ACM Transactions on …, 2011 - ieeexplore.ieee.org
Current security tools, using “signature-based” detection, do not handle compressed traffic,
whose market-share is constantly increasing. This paper focuses on compressed HTTP …

[PDF][PDF] Clear and Present Data: Opaque Traffic and its Security Implications for the Future.

AM White, S Krishnan, MD Bailey, F Monrose… - …, 2013 - mdbailey.web.engr.illinois.edu
Opaque traffic, ie, traffic that is compressed or encrypted, incurs particularly high overhead
for deep packet inspection engines and often yields little or no useful information. Our …

In the Compression {Hornet's} Nest: A Security Study of Data Compression in Network Services

G Pellegrino, D Balzarotti, S Winter, N Suri - 24th USENIX Security …, 2015 - usenix.org
In this paper, we investigate the current use of data compression in network services that are
at the core of modern web-based applications. While compression reduces network traffic, if …

High-speed decompression architecture of compressed http streams for the internet routers

H Okano, H Yamaki, H Nishi - 2016 International Conference …, 2016 - ieeexplore.ieee.org
In recent years, studies of DPI have been carried out actively. HTTP packets, which are a
kind of DPI target, include GZIP compressed packets, and multi-streamed GZIP compressed …

Debreach: Selective dictionary compression to prevent BREACH and CRIME

B Paulsen - 2017 - search.proquest.com
Compression side-channel attacks like CRIME and BREACH have made compression a
liability even though it is a powerful tool for improving efficiency. We present debreach, a …

Fast multi-pattern matching algorithm on compressed network traffic

H Peng, J Li, B Li, MH Arif - China Communications, 2016 - ieeexplore.ieee.org
Pattern matching is a fundamental approach to detect malicious behaviors and information
over Internet, which has been gradually used in high-speed network traffic analysis …