2013
DOI: 10.1093/comjnl/bxt019
|View full text |Cite
|
Sign up to set email alerts
|

ZIDS: A Privacy-Preserving Intrusion Detection System Using Secure Two-Party Computation Protocols

Abstract: We introduce ZIDS, a client-server solution for private detection of intrusions that is suitable for private detection of zero-day attacks in input data. The system includes an IDS server that has a set of sensitive signatures for zero-day attacks and IDS clients that possess some sensitive data (e.g. files, logs). Using ZIDS, each IDS client learns whether its input data matches any of the zero-day signatures, but neither party learns any additional information. In other words, the IDS client learns nothing a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
8
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 20 publications
(8 citation statements)
references
References 21 publications
0
8
0
Order By: Relevance
“…The authors mention that in case the topology of the SQL formula and the circuit have to be kept private, a generic UC should be utilized. Further applications of PFE given in [53] are evaluation of branching programs on encrypted data [37] and privacy-preserving intrusion detection [56].…”
Section: Applications Of Pfementioning
confidence: 99%
“…The authors mention that in case the topology of the SQL formula and the circuit have to be kept private, a generic UC should be utilized. Further applications of PFE given in [53] are evaluation of branching programs on encrypted data [37] and privacy-preserving intrusion detection [56].…”
Section: Applications Of Pfementioning
confidence: 99%
“…In addition, it could be embarrassing for a participant to be pointed out by the third party as a particular weak participant. Niksefat et al [43] designed ZIDS, a clientserver solution for private detection of intrusions. The system consists of an IDS server including sensitive signatures for zero-day attacks and IDS clients for handling sensitive data.…”
Section: Related Workmentioning
confidence: 99%
“…One of the first applications for PFE was privacy-preserving checking for credit worthiness [FAZ05], where not only the loanee's data, but also the loaner's function needs to be kept private. PFE allows for running proprietary software on private data, such as privacy-preserving software diagnosis [BPSW07], medical programs [BFK+09], or privacy-preserving intrusion detection [NSMS14]. UCs can be applied to obliviously filter remote streaming data [OI05] and for hiding queries in private database management systems such as Blind Seer [PKV+14,FVK+15].…”
Section: Applications Of Universal Circuitsmentioning
confidence: 99%