Two-Layer Architecture for Signature-Based Attacks Detection over Encrypted Network Traffic

被引:1
作者
Tahmi, Omar [1 ]
Talhi, Chamseddine [1 ]
Challal, Yacine [2 ]
机构
[1] Ecole Technol Super, Montreal, PQ, Canada
[2] Univ Doha Sci & Technol, Doha, Qatar
来源
FOUNDATIONS AND PRACTICE OF SECURITY, FPS 2022 | 2023年 / 13877卷
关键词
Secure middlebox; Searchable encryption; Intrusion detection; Homomorphic encryption; Signature-Based detection; Secure pattern matching;
D O I
10.1007/978-3-031-30122-3_26
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The rapid development of network function virtualization (NFV) technology on a large scale and the explosive growth of network traffic in enterprises has made it necessary to move to the paradigm of middlebox services (MB) in the cloud. Intrusion detection system (IDS) is one of these middlebox services that needs to be deployed in the cloud. However, with the growth of network attacks, redirecting enterprise traffic to external middleboxes inevitably raises new concerns related to packet content security and unauthorized access to the ruleset used for detection. To address these concerns, many research efforts targeted the design and development of IDS that operate over encrypted traffic (secure IDS) by looking for ways to make matching possible over encrypted data (aka secure/encrypted pattern matching) without any leakage while maintaining the same level of efficiency. However, most of the existing designs are communication inefficient and too slow to be deployed to support 5G network traffic that requires high throughput. Furthermore, the majority of real network traffic is legitimate and needs to be filtered quickly. Therefore, in order to improve the inspection delay, we propose in this paper a fast and efficient secure IDS that performs detection over encrypted network traffic based on the Searchable Encryption (SE) class of methods using a two-layer architecture in which the first layer is used to quickly filter out the majority of legitimate traffic and the second layer is used to further inspect only unfiltered malicious traffic. We implemented our solution and a recent powerful secure IDS and showed how our approach provides better results and outperforms it.
引用
收藏
页码:423 / 440
页数:18
相关论文
共 10 条
[1]   Cuckoo Filter: Practically Better Than Bloom [J].
Fan, Bin ;
Andersen, David G. ;
Kaminsky, Michael ;
Mitzenrnacher, Michael D. .
PROCEEDINGS OF THE 2014 CONFERENCE ON EMERGING NETWORKING EXPERIMENTS AND TECHNOLOGIES (CONEXT'14), 2014, :75-87
[2]  
Iovino V, 2008, LECT NOTES COMPUT SC, V5209, P75, DOI 10.1007/978-3-540-85538-5_5
[3]  
Lai S., 2021, IEEE T DEPENDABLE SE, V19, P2609
[4]   Result Pattern Hiding Searchable Encryption for Conjunctive Queries [J].
Lai, Shangqi ;
Patranabis, Sikhar ;
Sakzad, Amin ;
Liu, Joseph K. ;
Mukhopadhyay, Debdeep ;
Steinfeld, Ron ;
Sun, Shi-Feng ;
Liu, Dongxi ;
Zuo, Cong .
PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, :745-762
[5]  
Paillier P., 2005, Paillier encryption and signature schemes
[6]  
Poh GS, 2021, Arxiv, DOI arXiv:2101.04338
[7]   Privacy-Preserving Efficient Verifiable Deep Packet Inspection for Cloud-Assisted Middlebox [J].
Ren, Hao ;
Li, Hongwei ;
Liu, Dongxiao ;
Xu, Guowen ;
Cheng, Nan ;
Shen, Xuemin .
IEEE TRANSACTIONS ON CLOUD COMPUTING, 2022, 10 (02) :1052-1064
[8]   BlindBox: Deep Packet Inspection over Encrypted Traffic [J].
Sherry, Justine ;
Lan, Chang ;
Popa, Raluca Ada ;
Ratnasamy, Sylvia .
ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2015, 45 (04) :213-226
[9]   Multiple pattern matching for network security applications: Acceleration through vectorization [J].
Stylianopoulos, Charalampos ;
Almgren, Magnus ;
Landsiedel, Olaf ;
Papatriantafilou, Marina .
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2020, 137 :34-52
[10]  
Yuan XL, 2016, I C NETWORK PROTOCOL