Performance testing of GPU-based approximate matching algorithm on network traffic
Approved for public release; distribution is unlimited === Insider threat is one of the risks both government and private organizations have to deal with in protecting their important information. Data exfiltration and data leakage resulting from insiders’ activities can be very difficult to identif...
Main Author: | |
---|---|
Other Authors: | |
Published: |
Monterey, California: Naval Postgraduate School
2015
|
Online Access: | http://hdl.handle.net/10945/45198 |
id |
ndltd-nps.edu-oai-calhoun.nps.edu-10945-45198 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-nps.edu-oai-calhoun.nps.edu-10945-451982015-05-08T03:57:07Z Performance testing of GPU-based approximate matching algorithm on network traffic Jimoh, Mujeeb B. Beverly, Robert McCarrin, Michael Cyber Academic Group Approved for public release; distribution is unlimited Insider threat is one of the risks both government and private organizations have to deal with in protecting their important information. Data exfiltration and data leakage resulting from insiders’ activities can be very difficult to identify and quantify. Unfortunately, existing solutions that efficiently check whether data moving across a network is known to be sensitive are not resilient to attackers that make changes—even trivial modifications—to the data prior to exfiltration. This capstone examines the potential use of the sdhash approximate matching algorithm within the data exfiltration domain. Sdhash can be employed to look for active transfer of known sensitive files in network traffic, but in practice is hindered by the computational time required to check for known sensitive data. This research tested the performance of both the GPU and CPU implementation of sdhash to determine their suitability in high-network traffic environments such as the Department of Defense. The results of this experiment showed that better performance is achieved with the GPU when comparing large data sets. For small data sets, the CPU and GPU implementations exhibited similar performance. Thus, sdhash in the GPU implementation would be suitable for the Defense Department’s use. 2015-05-06T19:17:41Z 2015-05-06T19:17:41Z 2015-03 Thesis http://hdl.handle.net/10945/45198 Monterey, California: Naval Postgraduate School |
collection |
NDLTD |
sources |
NDLTD |
description |
Approved for public release; distribution is unlimited === Insider threat is one of the risks both government and private organizations have to deal with in protecting their important information. Data exfiltration and data leakage resulting from insiders’ activities can be very difficult to identify and quantify. Unfortunately, existing solutions that efficiently check whether data moving across a network is known to be sensitive are not resilient to attackers that make changes—even trivial modifications—to the data prior to exfiltration. This capstone examines the potential use of the sdhash approximate matching algorithm within the data exfiltration domain. Sdhash can be employed to look for active transfer of known sensitive files in network traffic, but in practice is hindered by the computational time required to check for known sensitive data. This research tested the performance of both the GPU and CPU implementation of sdhash to determine their suitability in high-network traffic environments such as the Department of Defense. The results of this experiment showed that better performance is achieved with the GPU when comparing large data sets. For small data sets, the CPU and GPU implementations exhibited similar performance. Thus, sdhash in the GPU implementation would be suitable for the Defense Department’s use. |
author2 |
Beverly, Robert |
author_facet |
Beverly, Robert Jimoh, Mujeeb B. |
author |
Jimoh, Mujeeb B. |
spellingShingle |
Jimoh, Mujeeb B. Performance testing of GPU-based approximate matching algorithm on network traffic |
author_sort |
Jimoh, Mujeeb B. |
title |
Performance testing of GPU-based approximate matching algorithm on network traffic |
title_short |
Performance testing of GPU-based approximate matching algorithm on network traffic |
title_full |
Performance testing of GPU-based approximate matching algorithm on network traffic |
title_fullStr |
Performance testing of GPU-based approximate matching algorithm on network traffic |
title_full_unstemmed |
Performance testing of GPU-based approximate matching algorithm on network traffic |
title_sort |
performance testing of gpu-based approximate matching algorithm on network traffic |
publisher |
Monterey, California: Naval Postgraduate School |
publishDate |
2015 |
url |
http://hdl.handle.net/10945/45198 |
work_keys_str_mv |
AT jimohmujeebb performancetestingofgpubasedapproximatematchingalgorithmonnetworktraffic |
_version_ |
1716803413549776896 |