A method for endpoint aware inspection in a Network Security Solution

dc.contributor.authorHeino Jenny
dc.contributor.authorJalio Christian
dc.contributor.authorHakkala Antti
dc.contributor.authorVirtanen Seppo
dc.contributor.organizationfi=kyberturvallisuusteknologia|en=Cyber Security Engineering|
dc.contributor.organizationfi=tietotekniikan laitos|en=Department of Computing|
dc.contributor.organization-code1.2.246.10.2458963.20.28753843706
dc.contributor.organization-code1.2.246.10.2458963.20.85312822902
dc.converis.publication-id174870268
dc.converis.urlhttps://research.utu.fi/converis/portal/Publication/174870268
dc.date.accessioned2022-10-28T13:35:51Z
dc.date.available2022-10-28T13:35:51Z
dc.description.abstract<p><br></p><p>Due to the surge in remote work after the outbreak of COVID-19, network security has gained an enormous focus. The issue of erroneous inspection decisions in network security solutions has long been criticised, but the importance of the decision accuracy has never been as important as today. In this paper we provide a solution for improving the inspection decision accuracy by specifying a method for endpoint aware inspection in a network security solution capable of performing deep packet inspection. The method utilises a subset of the protected network to gather hash fingerprints from the endpoint application network traffic patterns. The information gathered from this subset is then utilised for gaining endpoint awareness for the rest of the protected network. We use methods that work on the application layer of the protocol stack. This makes the method applicable not only for local implementations, such as NGFWs and IPSs, but also for SaaS and SASE solutions. The method is, however, easily utilised with lower layer information, such as network and transport layer information, for operating system awareness as well. We also present a proof-of-concept case study where we observe that, of the applicable network connections, 100% could be identified when the operating system and endpoint application were present in the source group. To our knowledge, this is the first method to enhance the inspection process accuracy by leveraging a subset of the protected network to gain endpoint awareness.<br></p>
dc.format.pagerange44517
dc.format.pagerange44530
dc.identifier.eissn2169-3536
dc.identifier.jour-issn2169-3536
dc.identifier.olddbid182990
dc.identifier.oldhandle10024/166084
dc.identifier.urihttps://www.utupub.fi/handle/11111/40370
dc.identifier.urlhttps://ieeexplore.ieee.org/document/9762961
dc.identifier.urnURN:NBN:fi-fe2022081154561
dc.language.isoen
dc.okm.affiliatedauthorHeino, Jenny
dc.okm.affiliatedauthorHakkala, Antti
dc.okm.affiliatedauthorVirtanen, Seppo
dc.okm.discipline213 Electronic, automation and communications engineering, electronicsen_GB
dc.okm.discipline213 Sähkö-, automaatio- ja tietoliikennetekniikka, elektroniikkafi_FI
dc.okm.internationalcopublicationnot an international co-publication
dc.okm.internationalityInternational publication
dc.okm.typeA1 ScientificArticle
dc.publisherInstitute of Electrical and Electronics Engineers
dc.publisher.countryUnited Statesen_GB
dc.publisher.countryYhdysvallat (USA)fi_FI
dc.publisher.country-codeUS
dc.relation.doi10.1109/ACCESS.2022.3170456
dc.relation.ispartofjournalIEEE Access
dc.relation.volume10
dc.source.identifierhttps://www.utupub.fi/handle/10024/166084
dc.titleA method for endpoint aware inspection in a Network Security Solution
dc.year.issued2022

Tiedostot

Näytetään 1 - 1 / 1
Ladataan...
Name:
A_Method_for_Endpoint.pdf
Size:
1.5 MB
Format:
Adobe Portable Document Format