首页> 外文OA文献 >Intrusion detection framework for encrypted networks
【2h】

Intrusion detection framework for encrypted networks

机译:加密网络的入侵检测框架

摘要

Network-based Intrusion Detection Systems (NIDSs) monitor network traffic for signs of malicious activities that have the potential to disrupt entire network infrastructures and services. NIDS can only operate when the network traffic is available and can be extracted for analysis. However, with the growing use of encrypted networks such as Virtual Private Networks (VPNs) that encrypt and conceal network traffic, a traditional NIDS can no longer access network traffic for analysis. The goal of this research is to address this problem by proposing a detection framework that allows a commercial off-the-shelf NIDS to function normally in a VPN without any modification. One of the features of the proposed framework is that it does not compromise on the confidentiality afforded by the VPN. Our work uses a combination of Shamir’s secret-sharing scheme and randomised network proxies to securely route network traffic to the NIDS for analysis. The detection framework is effective against two general classes of attacks – attacks targeted at the network hosts or attacks targeted at framework itself. We implement the detection framework as a prototype program and evaluate it. Our evaluation shows that the framework does indeed detect these classes of attacks and does not introduce any additional false positives. Despite the increase in network overhead in doing so, the proposed detection framework is able to consistently detect intrusions through encrypted networks.
机译:基于网络的入侵检测系统(NIDS)监视网络流量,以查找可能破坏整个网络基础架构和服务的恶意活动的迹象。仅当网络流量可用时,NIDS才能运行,并且可以提取NIDS进行分析。但是,随着诸如虚拟专用网(VPN)等加密网络的使用日益增加,这些虚拟网络对网络流量进行加密和隐藏,传统的NIDS无法再访问网络流量进行分析。这项研究的目的是通过提出一个检测框架来解决这个问题,该框架允许商用的现成NIDS在VPN中正常运行而无需进行任何修改。所提出框架的特征之一是,它不会损害VPN提供的机密性。我们的工作结合使用Shamir的秘密共享方案和随机网络代理,将网络流量安全地路由到NIDS进行分析。该检测框架可有效抵御两类常规攻击-针对网络主机的攻击或针对框架本身的攻击。我们将检测框架作为原型程序实施并对其进行评估。我们的评估表明,该框架确实能够检测到此类攻击,并且不会引入任何其他误报。尽管这样做会增加网络开销,但建议的检测框架仍能够通过加密的网络一致地检测入侵。

著录项

  • 作者

    Goh Vik Tor;

  • 作者单位
  • 年度 2010
  • 总页数
  • 原文格式 PDF
  • 正文语种 {"code":"en","name":"English","id":9}
  • 中图分类

相似文献

  • 外文文献
  • 中文文献
  • 专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号