Detecting malicious encrypted traffic with privacy set intersection in cloud-assisted industrial internet

被引:0
|
作者
Feng, Jingyu [1 ]
Zhang, Jing [1 ]
Zhang, Wenbo [1 ]
Han, Gang [1 ]
机构
[1] Xian Univ Posts & Telecommun, Sch Cyberspace Secur, Xian 710121, Peoples R China
基金
中国国家自然科学基金;
关键词
Malicious encrypted traffic detection; Privacy; set intersection; Cloud-assisted industrial; internet; Privacy protection; INTRUSION DETECTION; PROTOCOL;
D O I
10.1016/j.jisa.2024.103831
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Encryption technology provides the ability of confidential transmission to ensure the security of Industrial Internet communication, but it makes detecting malicious encrypted traffic very difficult. To resolve the conflict between the difficulty of malicious encrypted traffic detection and the requirements of traffic privacy protection, we propose a cloud-assisted Industrial Internet malicious encrypted traffic detection scheme with privacy protection. To accurately match the encrypted traffic and the detection rules, a privacy set intersection protocol based on the oblivious pseudorandom function and random garbled Bloom filter is constructed, which can detect malicious traffic without revealing data content. Meanwhile, our scheme can allow semi-trusted cloud servers to assist resource-constrained end devices to participate in private calculations. The key-homomorphic encryption is introduced to obfuscate the detection rules, making the detection rules always transparent to end users and semi-trusted cloud servers. We also design the random input verification to make the malicious end users do not have any opportunity to participate in the privacy set intersection calculation using arbitrary data. The scheme analysis and performance evaluation results show that our scheme can effectively guarantee the security of encrypted traffic detection with better detection performance and limited resource consumption.
引用
收藏
页数:16
相关论文
共 50 条
  • [1] Cloud-Assisted Laconic Private Set Intersection Cardinality
    Wu, Axin
    Xin, Xiangjun
    Zhu, Jianhao
    Liu, Wei
    Song, Chang
    Li, Guoteng
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2024, 12 (01) : 295 - 305
  • [2] Fair multi-owner search over encrypted data with forward and backward privacy in cloud-assisted Internet of Things
    Najafi, Aniseh
    Bayat, Majid
    Javadi, Hamid Haj Seyyed
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2021, 124 (124): : 285 - 294
  • [3] A Privacy-Enhanced Retrieval Technology for the Cloud-Assisted Internet of Things
    Wang, Tian
    Yang, Quan
    Shen, Xuewei
    Gadekallu, Thippa Reddy
    Wang, Weizheng
    Dev, Kapal
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (07) : 4981 - 4989
  • [4] Privacy-Preserving Multi-User Graph Intersection Scheme for Wireless Communications in Cloud-Assisted Internet of Things
    Yang, Shumei
    SENSORS, 2025, 25 (06)
  • [5] Cloud-Assisted Read Alignment and Privacy
    Fernandes, Maria
    Decouchant, Jeremie
    Couto, Francisco M.
    Esteves-Verissimo, Paulo
    11TH INTERNATIONAL CONFERENCE ON PRACTICAL APPLICATIONS OF COMPUTATIONAL BIOLOGY & BIOINFORMATICS, 2017, 616 : 220 - 227
  • [6] Privacy-preserving bidirectional keyword search over encrypted data for cloud-assisted IIoT
    Lee, Cheng-Yi
    Liu, Zi-Yuan
    Tso, Raylin
    Tseng, Yi-Fan
    JOURNAL OF SYSTEMS ARCHITECTURE, 2022, 130
  • [7] Cloud Computing for Malicious Encrypted Traffic Analysis and Collaboration
    Jeng, Tzung-Han
    Luo, Wen-Yang
    Huang, Chuan-Chiang
    Chen, Chien-Chih
    Chang, Kuang-Hung
    Chen, Yi-Ming
    INTERNATIONAL JOURNAL OF GRID AND HIGH PERFORMANCE COMPUTING, 2021, 13 (03) : 12 - 29
  • [8] Cloud-assisted Industrial Systems and Applications
    Wan, Jiafu
    Khan, Muhammad K.
    Qiu, Meikang
    Zhang, Daqiang
    MOBILE NETWORKS & APPLICATIONS, 2016, 21 (05): : 822 - 824
  • [9] Cloud-assisted Industrial Systems and Applications
    Jiafu Wan
    Muhammad K. Khan
    Meikang Qiu
    Daqiang Zhang
    Mobile Networks and Applications, 2016, 21 : 822 - 824
  • [10] Cloud-assisted Industrial Internet of Things (IIoT) - Enabled framework for health monitoring
    Hossain, M. Shamim
    Muhammad, Ghulam
    COMPUTER NETWORKS, 2016, 101 : 192 - 202