A Privacy-Preserving Infrastructure to Monitor Encrypted DNS Logs

被引:0
|
作者
Abdel-Rahman, Adam Oumar [1 ]
Levillain, Olivier [1 ]
Totel, Eric [1 ]
机构
[1] Telecom SudParis, Inst Polytech Paris, SAMOVAR, F-91120 Palaiseau, France
关键词
Forensics; Indicators of Compromise; Searchable Encryption;
D O I
10.1007/978-3-031-61231-2_12
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In the realm of cybersecurity, logging system and application activity is a crucial technique to detect and understand cyberattacks by identifying Indicators of Compromise (IoCs). Since these logs can take vast amounts of disk space, it can be tempting to delegate their storage to an external service provider. This requires to encrypt the data, so the service provider does not have access to possibly sensitive information. However, this usually makes it impossible to search for relevant information in the encrypted log. To address this predicament, this paper delves into the realm of modern cryptographic tools to reconcile the dual objectives of protecting log data from prying eyes while enabling controlled processing. We propose a comprehensive framework that contextualizes log data and presents several mechanisms to solve the outsourcing problem, allowing searchable encryption, and we apply our approach to DNS logs. Our contributions include the introduction of two novel schemes, namely symmetric and asymmetric, which facilitate efficient and secure retrieval of intrusion detection-related information from encrypted outsourced storage. Furthermore, we conduct extensive experiments on a test bed to evaluate and compare the effectiveness of the different solutions, providing valuable insights into the practical implementation of our proposed infrastructure for monitoring encrypted logs.
引用
收藏
页码:185 / 199
页数:15
相关论文
共 50 条
  • [1] Privacy-Preserving and Unforgeable Searchable Encrypted Audit Logs for Cloud Storage
    Zhao, Weiwei
    Li, Qiang
    Zou, Huanying
    Zhang, Aixin
    Li, Jianhua
    [J]. 2018 5TH IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (IEEE CSCLOUD 2018) / 2018 4TH IEEE INTERNATIONAL CONFERENCE ON EDGE COMPUTING AND SCALABLE CLOUD (IEEE EDGECOM 2018), 2018, : 29 - 34
  • [2] Privacy-Preserving Passive DNS
    Papadopoulos, Pavlos
    Pitropakis, Nikolaos
    Buchanan, William J.
    Lo, Owen
    Katsikas, Sokratis
    [J]. COMPUTERS, 2020, 9 (03) : 1 - 16
  • [3] Privacy-preserving queries on encrypted data
    Yang, Zhiqiang
    Zhong, Sheng
    Wright, Rebecca N.
    [J]. Computer Security - ESORICS 2006, Proceedings, 2006, 4189 : 479 - 495
  • [4] Privacy-Preserving Process MiningDifferential Privacy for Event Logs
    Felix Mannhardt
    Agnes Koschmider
    Nathalie Baracaldo
    Matthias Weidlich
    Judith Michael
    [J]. Business & Information Systems Engineering, 2019, 61 : 595 - 614
  • [5] Demo: PDNS: A Fully Privacy-Preserving DNS
    Xiao, Yunming
    Weng, Chenkai
    Yu, Ruijie
    Liu, Peizhi
    Varvello, Matteo
    Kuzmanovic, Aleksandar
    [J]. PROCEEDINGS OF THE 2023 ACM SIGCOMM 2023 CONFERENCE, SIGCOMM 2023, 2023, : 1182 - 1184
  • [6] Privacy-preserving Computation over Encrypted Vectors
    Hu, Rui
    Ding, Wenxiu
    Yan, Zheng
    [J]. 2020 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2020,
  • [7] Evaluation of Two Privacy-Preserving Protocols for the DNS
    Castillo-Perez, Sergio
    Garcia-Alfaro, Joaquin
    [J]. PROCEEDINGS OF THE 2009 SIXTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, VOLS 1-3, 2009, : 411 - 416
  • [8] Privacy-Preserving SVM Computing in the Encrypted Domain
    Maekawa, Takahiro
    Kawamura, Ayana
    Kinoshita, Yuma
    Kiya, Hitoshi
    [J]. 2018 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA ASC), 2018, : 897 - 902
  • [9] Efficient and Privacy-Preserving Categorization for Encrypted EMR
    Zhao, Zhiliang
    Zeng, Shengke
    Cheng, Shuai
    Hao, Fei
    [J]. MATHEMATICS, 2023, 11 (03)
  • [10] Privacy-Preserving Process Mining Differential Privacy for Event Logs
    Mannhardt, Felix
    Koschmider, Agnes
    Baracaldo, Nathalie
    Weidlich, Matthias
    Michael, Judith
    [J]. BUSINESS & INFORMATION SYSTEMS ENGINEERING, 2019, 61 (05) : 595 - 614