TY - GEN
T1 - Verifiable and Privacy-Preserving Deep Packet Inspection for Multiple Rule Service Providers
AU - Long, Zhentao
AU - Wu, Pengfei
AU - Zhang, Kai
AU - Gong, Junqing
AU - Ning, Jianting
N1 - Publisher Copyright:
© The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2026.
PY - 2026
Y1 - 2026
N2 - Secure outsourced middleboxes provide deep packet inspection (DPI) for encrypted traffic that enables the detection of malicious activities in communications. However, existing DPI systems generally support only a single rule service provider (RSP), whose rule sets are limited to specific attack types. This constraint reduces inspection coverage and diminishes the accuracy of detecting diverse malicious traffic. In this paper, we present MRv-DPI, a new privacy-preserving DPI system that supports inspection rules from multiple RSPs, enabling targeted inspection for any type of attack pattern. Additionally, by considering that the middleboxes may only use partial subscribed RSPs’ rule sets to inspect each packet, our system also provides inspection results verification. To support multiple RSPs, MRv-DPI employs a key-homomorphic pseudo-random function, allowing matching between rules encrypted under distinct keys and packets encrypted under a shared key. For result verification, we design a temporal-hashed substring search trie based on trusted hardware, ensuring tamper-resistant verification against untrusted cloud-based middleboxes. To address efficiency challenges arising from increased rule sets across multiple RSPs, MRv-DPI segments both packets and rules, and assigns each rule a main sub-segment to facilitate fast filtering of benign packets. We evaluate MRv-DPI through comprehensive experiments using four public rule sets in a real client-to-server environment. Compared to existing DPI solutions, MRv-DPI not only enhances both security and functionality but also achieves up to 2× faster packet inspection and reduces communication overhead by 36.1% – 57.4%.
AB - Secure outsourced middleboxes provide deep packet inspection (DPI) for encrypted traffic that enables the detection of malicious activities in communications. However, existing DPI systems generally support only a single rule service provider (RSP), whose rule sets are limited to specific attack types. This constraint reduces inspection coverage and diminishes the accuracy of detecting diverse malicious traffic. In this paper, we present MRv-DPI, a new privacy-preserving DPI system that supports inspection rules from multiple RSPs, enabling targeted inspection for any type of attack pattern. Additionally, by considering that the middleboxes may only use partial subscribed RSPs’ rule sets to inspect each packet, our system also provides inspection results verification. To support multiple RSPs, MRv-DPI employs a key-homomorphic pseudo-random function, allowing matching between rules encrypted under distinct keys and packets encrypted under a shared key. For result verification, we design a temporal-hashed substring search trie based on trusted hardware, ensuring tamper-resistant verification against untrusted cloud-based middleboxes. To address efficiency challenges arising from increased rule sets across multiple RSPs, MRv-DPI segments both packets and rules, and assigns each rule a main sub-segment to facilitate fast filtering of benign packets. We evaluate MRv-DPI through comprehensive experiments using four public rule sets in a real client-to-server environment. Compared to existing DPI solutions, MRv-DPI not only enhances both security and functionality but also achieves up to 2× faster packet inspection and reduces communication overhead by 36.1% – 57.4%.
KW - Deep packet inspection
KW - Key homomorphic pseudo-random function
KW - Multiple rule service providers
KW - Privacy preserving
UR - https://www.scopus.com/pages/publications/105028305745
U2 - 10.1007/978-981-95-6203-9_15
DO - 10.1007/978-981-95-6203-9_15
M3 - 会议稿件
AN - SCOPUS:105028305745
SN - 9789819562022
T3 - Lecture Notes in Computer Science
SP - 275
EP - 295
BT - Information Security and Cryptology - 21st International Conference, Inscrypt 2025, Revised Selected Papers
A2 - Chen, Rongmao
A2 - Deng, Robert H.
A2 - Yung, Moti
PB - Springer Science and Business Media Deutschland GmbH
T2 - 21st International Conference on Information Security and Cryptology, Inscrypt 2025
Y2 - 19 October 2025 through 22 October 2025
ER -