2021
DOI: 10.1049/ise2.12017
|View full text |Cite
|
Sign up to set email alerts
|

Towards practical intrusion detection system over encrypted traffic*

Abstract: Privacy and data confidentiality are today at the heart of many discussions. But such data protection should not be done at the detriment of other security aspects. In the context of network traffic, intrusion detection system becomes totally blind when the traffic is encrypted, making clients again vulnerable to known attacks. To reconcile security and privacy, BlindBox and BlindIDS are proposed to perform Deep Packet Inspection over an encrypted traffic, based on two different cryptographic techniques. But, … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
26
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 16 publications
(27 citation statements)
references
References 15 publications
1
26
0
Order By: Relevance
“…During the validation process, the client is responsible to authenticate the identity of the destination server, rejecting impostors. To circumvent this 123:21 [106] Extend the TLS protocol to support middleboxes 2015 Asghar et al [34] Trusted execution for Network Functions (NFs) in the cloud 2016 Canard et al [41] DPI on the encrypted traffic using encrypted rules 2017 Lan et al [87] Trusted execution for NFs in the cloud 2016 Yuan et al [171] DPI on the encrypted traffic using encrypted rules 2016 Fan et al [66] DPI on the encrypted traffic using encrypted rules 2017 Naylor et al [105] Secure outsourcing of middlebox NFs in untrusted infrastructures 2017 Han et al [74] Secure outsourcing of middlebox NFs in untrusted infrastructures 2017 Coughlin et al [53] Secure outsourcing of middlebox NFV in untrusted infrastructures 2017 Poddar et al [119] Secure outsourcing of middlebox NFV in untrusted infrastructures 2018 Trach et al [148] Secure outsourcing of middlebox NFs in untrusted infrastructures 2018 Goltzsche et al [71] Secure virtual private network (VPN) with middlebox NF 2018 Duan et al [61] Secure outsourcing of middlebox NFs in untrusted infrastructures 2019 Ning et al [107] DPI on the encrypted traffic using encrypted rules 2019 Guo et al [72] Privacy preserving packet header processing for middleboxes in the cloud 2020 validation process, a self-signed CA certificate is injected into the client browser's root store at the time of installation. For network middleboxes, administrators deploy the middlebox certificate to the corresponding devices (e.g., of the organization) in a similar manner.…”
Section: Network Functions In Middleboxes After Network Encryptionmentioning
confidence: 99%
See 4 more Smart Citations
“…During the validation process, the client is responsible to authenticate the identity of the destination server, rejecting impostors. To circumvent this 123:21 [106] Extend the TLS protocol to support middleboxes 2015 Asghar et al [34] Trusted execution for Network Functions (NFs) in the cloud 2016 Canard et al [41] DPI on the encrypted traffic using encrypted rules 2017 Lan et al [87] Trusted execution for NFs in the cloud 2016 Yuan et al [171] DPI on the encrypted traffic using encrypted rules 2016 Fan et al [66] DPI on the encrypted traffic using encrypted rules 2017 Naylor et al [105] Secure outsourcing of middlebox NFs in untrusted infrastructures 2017 Han et al [74] Secure outsourcing of middlebox NFs in untrusted infrastructures 2017 Coughlin et al [53] Secure outsourcing of middlebox NFV in untrusted infrastructures 2017 Poddar et al [119] Secure outsourcing of middlebox NFV in untrusted infrastructures 2018 Trach et al [148] Secure outsourcing of middlebox NFs in untrusted infrastructures 2018 Goltzsche et al [71] Secure virtual private network (VPN) with middlebox NF 2018 Duan et al [61] Secure outsourcing of middlebox NFs in untrusted infrastructures 2019 Ning et al [107] DPI on the encrypted traffic using encrypted rules 2019 Guo et al [72] Privacy preserving packet header processing for middleboxes in the cloud 2020 validation process, a self-signed CA certificate is injected into the client browser's root store at the time of installation. For network middleboxes, administrators deploy the middlebox certificate to the corresponding devices (e.g., of the organization) in a similar manner.…”
Section: Network Functions In Middleboxes After Network Encryptionmentioning
confidence: 99%
“…SPABox [66] is a middlebox-based system that supports keyword-based and data analysis-based DPI functions over encrypted traffic without having to decrypt it. Canard et al [41] present BlindIDS, which is able to perform deep packet inspection directly on encrypted network packets for intrusion detection. BlindIDS does not assume knowledge over the traffic content or the patterns of detection signatures.…”
Section: Network Functions In Middleboxesmentioning
confidence: 99%
See 3 more Smart Citations