Towards practical intrusion detection system over encrypted traffic*

被引:3
|
作者
Canard, Sebastien [1 ]
Li, Chaoyun [2 ]
机构
[1] Appl Crypto Grp, Orange Labs, Caen, France
[2] Katholieke Univ Leuven, IMEC, COSIC, Dept Elect Engn ESAT, Leuven, Belgium
关键词
Technology transfer - Computer crime - Commerce - Cryptography;
D O I
10.1049/ise2.12017
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Privacy and data confidentiality are today at the heart of many discussions. But such data protection should not be done at the detriment of other security aspects. In the context of network traffic, intrusion detection system becomes totally blind when the traffic is encrypted, making clients again vulnerable to known attacks. To reconcile security and privacy, BlindBox and BlindIDS are proposed to perform Deep Packet Inspection over an encrypted traffic, based on two different cryptographic techniques. But, on one side, even if BlindBox is quite efficient to detect an anomalous encrypted traffic, it necessitates a very high setup time for clients and servers and does not protect the know-how of Security Editors (SEs) working on detection rules. On the other side, BlindIDS does protect SE's market and does not introduce any latency during setup time, but is definitely not enough efficient for a practical use. Herein, it is shown that the design of a fully efficient and market-compliant intrusion detection system over an encrypted traffic is possible. The system is based on only symmetric cryptography, and permits to encrypt a packet of 1500 bytes in about 6 mu s and to test such packets with 3000 rules in less than 2 mu s.
引用
收藏
页码:231 / 246
页数:16
相关论文
共 50 条
  • [1] Encrypted Traffic and IPsec Challenges for Intrusion Detection System
    Kumar, Manish
    Hanumanthappa, M.
    Kumar, T. V. Suresh
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, 2013, 174 : 721 - 727
  • [2] Network Intrusion Detection in Encrypted Traffic
    Papadogiannaki, Eva
    Tsirantonakis, Giorgos
    Ioannidis, Sotiris
    2022 5TH IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (IEEE DSC 2022), 2022,
  • [3] Towards Intrusion Detection for Encrypted Networks
    Goh, Vik Tor
    Zimmermann, Jacob
    Looi, Mark
    2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), VOLS 1 AND 2, 2009, : 540 - 545
  • [4] Survey: Intrusion Detection Systems in Encrypted Traffic
    Kovanen, Tiina
    David, Gil
    Hamalainen, Timo
    INTERNET OF THINGS, SMART SPACES, AND NEXT GENERATION NETWORKS AND SYSTEMS, NEW2AN 2016/USMART 2016, 2016, 9870 : 281 - 293
  • [5] BlindIDS: Market-Compliant and Privacy-Friendly Intrusion Detection System over Encrypted Traffic
    Canard, Sebastien
    Diop, Aida
    Kheir, Nizar
    Paindavoine, Marie
    Sabt, Mohamed
    PROCEEDINGS OF THE 2017 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIA CCS'17), 2017, : 561 - 574
  • [6] Intrusion Detection Over Encrypted Network Data
    Karacay, Leyli
    Savas, Erkay
    Alptekin, Halit
    COMPUTER JOURNAL, 2020, 63 (04): : 604 - 619
  • [7] Encrypted Cyberattack Detection System over Encrypted IoT Traffic Based on Statistical Intelligence
    Ji, Il Hwan
    Lee, Ju Hyeon
    Jeon, Seungho
    Seo, Jung Taek
    CMES-COMPUTER MODELING IN ENGINEERING & SCIENCES, 2024, 141 (02): : 1519 - 1549
  • [8] An Intrusion Detection Model Orienting towards Encrypted Conversation
    Li Li
    Zhang Zhong-ke
    2009 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 1, 2009, : 541 - 545
  • [9] Towards a Practical Cluster Analysis over Encrypted Data
    Cheon, Jung Hee
    Kim, Duhyeong
    Park, Jai Hyun
    SELECTED AREAS IN CRYPTOGRAPHY - SAC 2019, 2020, 11959 : 227 - 249
  • [10] Acceleration of Intrusion Detection in Encrypted Network Traffic Using Heterogeneous Hardware
    Papadogiannaki, Eva
    Ioannidis, Sotiris
    SENSORS, 2021, 21 (04) : 1 - 21