PRI: Privacy Preserving Inspection of Encrypted Network Traffic

被引:7
|
作者
Schiff, Liron [1 ]
Schmid, Stefan [2 ]
机构
[1] Tel Aviv Univ, Tel Aviv, Israel
[2] Aalborg Univ, Aalborg, Denmark
关键词
D O I
10.1109/SPW.2016.34
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Traffic inspection is a fundamental building block of many security solutions today. For example, to prevent the leakage or exfiltration of confidential insider information, as well as to block malicious traffic from entering the network, most enterprises today operate intrusion detection and prevention systems that inspect traffic. However, the state-of-theart inspection systems do not reflect well the interests of the different involved autonomous roles. For example, employees in an enterprise, or a company outsourcing its network management to a specialized third party, may require that their traffic remains confidential, even from the system administrator. Moreover, the rules used by the intrusion detection system, or more generally the configuration of an online or offline anomaly detection engine, may be provided by a third party, e.g., a security research firm, and can hence constitute a critical business asset which should be kept confidential. Today, it is often believed that accounting for these additional requirements is impossible, as they contradict efficiency and effectiveness. We in this paper explore a novel approach, called Privacy Preserving Inspection (PRI), which provides a solution to this problem, by preserving privacy of traffic inspection and confidentiality of inspection rules and configurations, and e.g., also supports the flexible installation of additional Data Leak Prevention (DLP) rules specific to the company.
引用
收藏
页码:296 / 303
页数:8
相关论文
共 50 条
  • [41] Transparent hashing in the encrypted domain for privacy preserving image retrieval
    Karthik, Kannan
    Kashyap, Sachin
    [J]. SIGNAL IMAGE AND VIDEO PROCESSING, 2013, 7 (04) : 647 - 664
  • [42] Approaches and challenges of privacy preserving search over encrypted data
    Kumar, D. V. N. Siva
    Thilagam, P. Santhi
    [J]. INFORMATION SYSTEMS, 2019, 81 : 63 - 81
  • [43] Protocol identification of encrypted network traffic
    Gebski, Matthew
    Penev, Alex
    Wong, Raymond K.
    [J]. 2006 IEEE/WIC/ACM International Conference on Web Intelligence, (WI 2006 Main Conference Proceedings), 2006, : 957 - 960
  • [44] Network Intrusion Detection in Encrypted Traffic
    Papadogiannaki, Eva
    Tsirantonakis, Giorgos
    Ioannidis, Sotiris
    [J]. 2022 5TH IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (IEEE DSC 2022), 2022,
  • [45] Universal Network Traffic Analysis for Malicious Traffic Detection using RappNet: A Privacy-Preserving Approach
    Barut, Onur
    Deng, Lulin
    Lu, David
    [J]. 2023 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY, CNS, 2023,
  • [46] FEAT: A Federated Approach for Privacy-Preserving Network Traffic Classification in Heterogeneous Environments
    Guo, Yingya
    Wang, Dan
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (02) : 1274 - 1285
  • [47] Federated In-Network Machine Learning for Privacy-Preserving IoT Traffic Analysis
    Zang, Mingyuan
    Zheng, Changgang
    Koziak, Tomasz
    Zilberman, Noa
    Dittmann, Lars
    [J]. ACM Transactions on Internet Technology, 2024, 24 (04)
  • [48] An Efficient Privacy-Preserving Scheme against Traffic Analysis Attacks in Network Coding
    Fan, Yanfei
    Jiang, Yixin
    Zhu, Haojin
    Shen, Xuemin
    [J]. IEEE INFOCOM 2009 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-5, 2009, : 2213 - 2221
  • [49] Federated Approach for Privacy-Preserving Traffic Prediction Using Graph Convolutional Network
    Lonare, Savita
    Bhramaramba, Ravi
    [J]. Journal of Shanghai Jiaotong University (Science), 2024, 29 (03) : 509 - 517
  • [50] Privacy-Preserving Internet Traffic Publication
    Guo, Longkun
    Shen, Hong
    [J]. 2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, : 884 - 891