2020
DOI: 10.1007/978-3-030-58951-6_1
|View full text |Cite
|
Sign up to set email alerts
|

Pine: Enabling Privacy-Preserving Deep Packet Inspection on TLS with Rule-Hiding and Fast Connection Establishment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 17 publications
(7 citation statements)
references
References 14 publications
0
7
0
Order By: Relevance
“…Production devices in service provider and user environments employ traffic classification for attack detection that would typically require significant computing resources to decrypt and (re)encrypt data in real-time affecting the network throughput, delay, and overall user experience. e costs of associated techniques such as deep packet inspection (DPI) are also substantial in terms of equipment and resources that these are not considered readily adoptable [27,28]. e encryption and decryption of network traffic is not only resource intensive but also a challenging task for network managers in adequately preserving the privacy of end-users.…”
Section: Cyber Security and Neuralmentioning
confidence: 99%
“…Production devices in service provider and user environments employ traffic classification for attack detection that would typically require significant computing resources to decrypt and (re)encrypt data in real-time affecting the network throughput, delay, and overall user experience. e costs of associated techniques such as deep packet inspection (DPI) are also substantial in terms of equipment and resources that these are not considered readily adoptable [27,28]. e encryption and decryption of network traffic is not only resource intensive but also a challenging task for network managers in adequately preserving the privacy of end-users.…”
Section: Cyber Security and Neuralmentioning
confidence: 99%
“…However, the design of the cryptography-based outsourced network functions may have defects when applying the encryption schemes. For example, Ning et al [34] pointed out that PrivDPI [32] is vulnerable to the brute-force guessing when the rule set is small.…”
Section: C) Side-channel Attackmentioning
confidence: 99%
“…In PrivDPI, the encrypted packet tokens in a new session can be derived from the encrypted tokens in the last session by preserving a count table, which makes the encrypted ruleset in the middlebox reusable. However, according to Ning et al [34], PrivDPI is vulnerable to brute-force attacks, where the middlebox can forge any encrypted rules by itself and then infer the content of the encrypted traffic. Ning et al [34] then proposed…”
Section: A Equality Matchmentioning
confidence: 99%
See 2 more Smart Citations