Detecting attacks in encrypted networks using secret-sharing schemes
Data(s) |
01/07/2010
|
---|---|
Resumo |
Secret-sharing schemes describe methods to securely share a secret among a group of participants. A properly constructed secret-sharing scheme guarantees that the share belonging to one participant does not reveal anything about the shares of others or even the secret itself. Besides being used to distribute a secret, secret-sharing schemes have also been used in secure multi-party computations and redundant residue number systems for error correction codes. In this paper, we propose that the secret-sharing scheme be used as a primitive in a Network-based Intrusion Detection System (NIDS) to detect attacks in encrypted Networks. Encrypted networks such as Virtual Private Networks (VPNs) fully encrypt network traffic which can include both malicious and non-malicious traffic. Traditional NIDS cannot monitor such encrypted traffic. We therefore describe how our work uses a combination of Shamir's secret-sharing scheme and randomised network proxies to enable a traditional NIDS to function normally in a VPN environment. |
Formato |
application/pdf |
Identificador | |
Publicador |
Malaysian Society for Cryptology Research |
Relação |
http://eprints.qut.edu.au/38808/1/c38808.pdf http://www.mscr.org.my/V2(1)/PP%2089-100.pdf Goh, Vik Tor, Zimmermann, Jacob, & Looi, Mark (2010) Detecting attacks in encrypted networks using secret-sharing schemes. International Journal of Cryptology Research, 2(1), pp. 89-99. |
Direitos |
Copyright 2010 [please consult the authors] |
Fonte |
Computer Science; Faculty of Science and Technology; Information Security Institute |
Palavras-Chave | #080303 Computer System Security #secret-sharing #intrusion detection #encrypted networks #VPN |
Tipo |
Journal Article |