首页> 外文会议>International Conference on Availability, Reliability, and Security >Towards Intrusion Detection for Encrypted Networks
【24h】

Towards Intrusion Detection for Encrypted Networks

机译:致侵入加密网络的入侵检测

获取原文

摘要

Traditionally, network-based Intrusion Detection Systems (NIDS) monitor network traffic for signs of malicious activities. However, with the growing use of Virtual Private Networks (VPNs) that encrypt network traffic, the NIDS can no longer analyse the encrypted data. This essentially negates any protection offered by the NIDS. Although the encrypted traffic can be decrypted at a network gateway for analysis, this compromises on data confidentiality. In this paper, we propose a detection framework which allows a traditional NIDS to continue functioning, without compromising the confidentiality afforded by the VPN. Our approach uses Shamir's secret-sharing scheme and randomised network proxies to enable detection of malicious activities in encrypted channels. Additionally, this approach is able to detect any malicious attempts to forge network traffic with the intention of evading detection. Our experiments show that the probability of a successful evasion is low, at about 0.98% in the worst case. We implement our approach in a prototype and present some preliminary results. Overall, the proposed approach is able to consistently detect intrusions and does not introduce any additional false positives.
机译:传统上,基于网络的入侵检测系统(NIDS)监控网络流量,用于恶意活动的迹象。但是,随着越来越多的虚拟专用网络(VPN)来加密网络流量,NID无法再分析加密数据。这基本上否定了NIDS提供的任何保护。虽然可以在网络网关中解密加密流量以进行分析,但这种情况对数据机密性妥协。在本文中,我们提出了一种检测框架,其允许传统的NID继续运行,而不会影响VPN提供的机密性。我们的方法使用Shamir的秘密共享方案和随机网络代理,以便在加密通道中检测恶意活动。此外,这种方法能够检测到任何恶意尝试,以便在逃避检测的意图中伪造网络流量。我们的实验表明,成功逃避的可能性低,最坏情况下的概率为约0.98%。我们在原型中实现了我们的方法,并提出了一些初步结果。总体而言,所提出的方法能够始终如一地检测入侵,并没有引入任何额外的误报。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号