Network Intrusion Detection in Encrypted Traffic

被引:3
|
作者
Papadogiannaki, Eva [1 ]
Tsirantonakis, Giorgos [1 ]
Ioannidis, Sotiris [2 ]
机构
[1] FORTH ICS, Iraklion, Greece
[2] Tech Univ Crete, Khania, Greece
关键词
IDENTIFICATION;
D O I
10.1109/DSC54232.2022.9888942
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Traditional signature-based intrusion detection systems inspect packet headers and payloads to report any malicious or abnormal traffic behavior that is observed in the network. With the advent and rapid adoption of network encryption mechanisms, typical deep packet inspection systems that focus only on the processing of network packet payload contents are gradually becoming obsolete. Advancing intrusion detection tools to be also effective in encrypted networks is crucial. In this work, we propose a signature language indicating packet sequences. Signatures detect events of possible intrusions and malicious actions in encrypted networks using packet metadata. We demonstrate the effectiveness of this methodology using different tools for penetrating vulnerable web servers and a public dataset with traffic that originates from IoT malware. We implement the signature language and we integrate it into an intrusion detection system. Using our proposed methodology, the generated signatures can effectively and efficiently report intrusion attempts.
引用
收藏
页数:8
相关论文
共 50 条
  • [31] Intelligent model for the detection and classification of encrypted network traffic in cloud infrastructure
    Dawood, Muhammad
    Xiao, Chunagbai
    Tu, Shanshan
    Alotaibi, Faiz Abdullah
    Alnfiai, Mrim M.
    Farhan, Muhammad
    PEERJ COMPUTER SCIENCE, 2024, 10
  • [32] A study on the feature selection of network traffic for intrusion detection purpose
    Ma, Wanli
    Tran, Dat
    Sharma, Dharmendra
    ISI 2008: 2008 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS, 2008, : 245 - +
  • [33] On Generating Network Traffic Datasets with Synthetic Attacks for Intrusion Detection
    Cordero, Carlos Garcia
    Vasilomanolakis, Emmanouil
    Wainakh, Aidmar
    Muhlhauser, Max
    Nadjm-Tehrani, Simin
    ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2021, 24 (02)
  • [34] Intrusion Detection in Multiservice Network on the Basis of Registered Traffic Filtration
    Kartashevskiy, Vyacheslav
    Pozdnyak, Irina
    Buranova, Marina
    2018 INTERNATIONAL SCIENTIFIC-PRACTICAL CONFERENCE: PROBLEMS OF INFOCOMMUNICATIONS SCIENCE AND TECHNOLOGY (PIC S&T), 2018, : 803 - 806
  • [35] The statistical analysis of a network traffic for the intrusion detection and prevention systems
    Kuznetsov, A.A.
    Smirnov, A.A.
    Danilenko, D.A.
    Berezovsky, A.
    Telecommunications and Radio Engineering (English translation of Elektrosvyaz and Radiotekhnika), 2015, 74 (01): : 61 - 78
  • [36] Late Fusion for Improving Intrusion Detection in a Network Traffic Dataset
    Salazar, Addisson
    Vargas, Nancy
    Safont, Gonzalo
    Vergara, Luis
    2021 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE (CSCI 2021), 2021, : 1684 - 1689
  • [37] Resource-sensitive intrusion detection models for network traffic
    Khoshgoftaar, TM
    Abushadi, ME
    EIGHTH IEEE INTERNATIONAL SYMPOSIUM ON HIGH ASSURANCE SYSTEMS ENGINEERING, PROCEEDINGS, 2004, : 249 - 258
  • [38] Intrusion Detection in IoT Network Traffic Using Markov Model
    Liu, I-Hsien
    Huang, Hsiao-Ching
    Lee, Meng-Huan
    Li, Jung-Shian
    SENSORS AND MATERIALS, 2024, 36 (03) : 1127 - 1134
  • [39] Evolutive modeling of TCP/IP network traffic for intrusion detection
    Neri, F
    REAL-WORLD APPLICATIONS OF EVOLUTIONARY COMPUTING, PROCEEDINGS, 2000, 1803 : 214 - 223
  • [40] Protocol identification of encrypted network traffic
    Gebski, Matthew
    Penev, Alex
    Wong, Raymond K.
    2006 IEEE/WIC/ACM International Conference on Web Intelligence, (WI 2006 Main Conference Proceedings), 2006, : 957 - 960