Detecting attacks in encrypted networks using secret-sharing schemes


Autoria(s): Goh, Vik Tor; Zimmermann, Jacob; Looi, Mark
Data(s)

01/07/2010

Resumo

Secret-sharing schemes describe methods to securely share a secret among a group of participants. A properly constructed secret-sharing scheme guarantees that the share belonging to one participant does not reveal anything about the shares of others or even the secret itself. Besides being used to distribute a secret, secret-sharing schemes have also been used in secure multi-party computations and redundant residue number systems for error correction codes. In this paper, we propose that the secret-sharing scheme be used as a primitive in a Network-based Intrusion Detection System (NIDS) to detect attacks in encrypted Networks. Encrypted networks such as Virtual Private Networks (VPNs) fully encrypt network traffic which can include both malicious and non-malicious traffic. Traditional NIDS cannot monitor such encrypted traffic. We therefore describe how our work uses a combination of Shamir's secret-sharing scheme and randomised network proxies to enable a traditional NIDS to function normally in a VPN environment.

Formato

application/pdf

Identificador

http://eprints.qut.edu.au/38808/

Publicador

Malaysian Society for Cryptology Research

Relação

http://eprints.qut.edu.au/38808/1/c38808.pdf

http://www.mscr.org.my/V2(1)/PP%2089-100.pdf

Goh, Vik Tor, Zimmermann, Jacob, & Looi, Mark (2010) Detecting attacks in encrypted networks using secret-sharing schemes. International Journal of Cryptology Research, 2(1), pp. 89-99.

Direitos

Copyright 2010 [please consult the authors]

Fonte

Computer Science; Faculty of Science and Technology; Information Security Institute

Palavras-Chave #080303 Computer System Security #secret-sharing #intrusion detection #encrypted networks #VPN
Tipo

Journal Article