Intrusion detection framework for encrypted networks
Data(s) |
2010
|
---|---|
Resumo |
Network-based Intrusion Detection Systems (NIDSs) monitor network traffic for signs of malicious activities that have the potential to disrupt entire network infrastructures and services. NIDS can only operate when the network traffic is available and can be extracted for analysis. However, with the growing use of encrypted networks such as Virtual Private Networks (VPNs) that encrypt and conceal network traffic, a traditional NIDS can no longer access network traffic for analysis. The goal of this research is to address this problem by proposing a detection framework that allows a commercial off-the-shelf NIDS to function normally in a VPN without any modification. One of the features of the proposed framework is that it does not compromise on the confidentiality afforded by the VPN. Our work uses a combination of Shamir’s secret-sharing scheme and randomised network proxies to securely route network traffic to the NIDS for analysis. The detection framework is effective against two general classes of attacks – attacks targeted at the network hosts or attacks targeted at framework itself. We implement the detection framework as a prototype program and evaluate it. Our evaluation shows that the framework does indeed detect these classes of attacks and does not introduce any additional false positives. Despite the increase in network overhead in doing so, the proposed detection framework is able to consistently detect intrusions through encrypted networks. |
Formato |
application/pdf |
Identificador | |
Publicador |
Queensland University of Technology |
Relação |
http://eprints.qut.edu.au/41733/1/Vik_Tor_Goh_Thesis.pdf Goh, Vik Tor (2010) Intrusion detection framework for encrypted networks. PhD thesis, Queensland University of Technology. |
Fonte |
Faculty of Science and Technology; Information Security Institute |
Palavras-Chave | #network-based intrusion detection system, NIDS, encrypted networks, IPsec, virtual private networks, VPN, secret-sharing, application-level attacks, conspiracy attacks |
Tipo |
Thesis |