2015
DOI: 10.1007/978-3-319-26823-1_8
|View full text |Cite
|
Sign up to set email alerts
|

iDeFEND: Intrusion Detection Framework for Encrypted Network Data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 7 publications
0
3
0
Order By: Relevance
“…The existing privacy protection policies for today’s IoT include encryption , anonymization and obfuscation techniques, which are mainly for single services. However, new privacy preservation techniques in these interdependent services (e.g., searchable encryption, usage control, end-to-end encryption [39] with homomorphic encryption) by design principle for objects, devices, users, subsystems, and services are required. Critical real-time operation : The IoT of the future should be flexible and adaptable to sudden changes of the status and conditions of the infrastructures. This is due in order to have fast response to critical situations such as the increasing frequency of natural disasters due to the global climate change [40].…”
Section: Challenges and Open Issuesmentioning
confidence: 99%
See 1 more Smart Citation
“…The existing privacy protection policies for today’s IoT include encryption , anonymization and obfuscation techniques, which are mainly for single services. However, new privacy preservation techniques in these interdependent services (e.g., searchable encryption, usage control, end-to-end encryption [39] with homomorphic encryption) by design principle for objects, devices, users, subsystems, and services are required. Critical real-time operation : The IoT of the future should be flexible and adaptable to sudden changes of the status and conditions of the infrastructures. This is due in order to have fast response to critical situations such as the increasing frequency of natural disasters due to the global climate change [40].…”
Section: Challenges and Open Issuesmentioning
confidence: 99%
“…The existing privacy protection policies for today’s IoT include encryption , anonymization and obfuscation techniques, which are mainly for single services. However, new privacy preservation techniques in these interdependent services (e.g., searchable encryption, usage control, end-to-end encryption [39] with homomorphic encryption) by design principle for objects, devices, users, subsystems, and services are required.…”
Section: Challenges and Open Issuesmentioning
confidence: 99%
“…Taleb et al [ 45 , 46 ] propose solutions based on per-packet inspection of the header information in order to identify misuses in encrypted protocols. On the other hand, iDeFEND [ 47 ] is a framework for inspecting encrypted network data without breaking the security model of end-to-end encryption. Goh et al [ 48 , 49 ] propose mirroring the traffic to a central IDS, able to decrypt the traffic and perform deep packet inspection, while ProtoMon [ 50 ] is based on detection of protocol misuse.…”
Section: Related Workmentioning
confidence: 99%