Network Intrusion Detection in Encrypted Traffic

被引:2
|
作者
Papadogiannaki, Eva [1 ]
Tsirantonakis, Giorgos [1 ]
Ioannidis, Sotiris [2 ]
机构
[1] FORTH ICS, Iraklion, Greece
[2] Tech Univ Crete, Khania, Greece
关键词
IDENTIFICATION;
D O I
10.1109/DSC54232.2022.9888942
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Traditional signature-based intrusion detection systems inspect packet headers and payloads to report any malicious or abnormal traffic behavior that is observed in the network. With the advent and rapid adoption of network encryption mechanisms, typical deep packet inspection systems that focus only on the processing of network packet payload contents are gradually becoming obsolete. Advancing intrusion detection tools to be also effective in encrypted networks is crucial. In this work, we propose a signature language indicating packet sequences. Signatures detect events of possible intrusions and malicious actions in encrypted networks using packet metadata. We demonstrate the effectiveness of this methodology using different tools for penetrating vulnerable web servers and a public dataset with traffic that originates from IoT malware. We implement the signature language and we integrate it into an intrusion detection system. Using our proposed methodology, the generated signatures can effectively and efficiently report intrusion attempts.
引用
收藏
页数:8
相关论文
共 50 条
  • [21] Network Intrusion Traffic Detection Based on Feature Extraction
    Yu, Xuecheng
    Huang, Yan
    Zhang, Yu
    Song, Mingyang
    Jia, Zhenhong
    CMC-COMPUTERS MATERIALS & CONTINUA, 2024, 78 (01): : 473 - 492
  • [22] IoT Wireless Intrusion Detection and Network Traffic Analysis
    Ponnusamy, Vasaki
    Yichiet, Aun
    Jhanjhi, N. Z.
    Humayun, Mamoona
    Almufareh, Maram Fahhad
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2022, 40 (03): : 865 - 879
  • [23] Image-Based Intrusion Detection in Network Traffic
    Golubev, Sergei
    Novikova, Evgenia
    INTELLIGENT DISTRIBUTED COMPUTING XV, IDC 2022, 2023, 1089 : 51 - 60
  • [24] IoT Wireless Intrusion Detection and Network Traffic Analysis
    Ponnusamy V.
    Yichiet A.
    Jhanjhi N.Z.
    Humayun M.
    Almufareh M.F.
    Computer Systems Science and Engineering, 2021, 40 (03): : 865 - 879
  • [25] Deep Learning Applications for Intrusion Detection in Network Traffic
    Getman, A. I.
    Rybolovlev, D. A.
    Nikolskaya, A. G.
    PROGRAMMING AND COMPUTER SOFTWARE, 2024, 50 (07) : 493 - 510
  • [26] Neural visualization of network traffic data for intrusion detection
    Corchado, Emilio
    Herrero, Alvaro
    APPLIED SOFT COMPUTING, 2011, 11 (02) : 2042 - 2056
  • [27] Multivariate statistical analysis of network traffic for intrusion detection
    Kanaoka, A
    Okamoto, E
    14TH INTERNATIONAL WORKSHOP ON DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 2003, : 472 - 476
  • [28] Intrusion Detection Using Clustering of Network Traffic Flows
    Bailey, Matthew
    Collins, Connor
    Sinda, Matthew
    Hu, Gongzhu
    2017 18TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNDP 2017), 2017, : 615 - 620
  • [29] Towards Intrusion Detection for Encrypted Networks
    Goh, Vik Tor
    Zimmermann, Jacob
    Looi, Mark
    2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), VOLS 1 AND 2, 2009, : 540 - 545
  • [30] A Network Intrusion Detection System for Concept Drifting Network Traffic Data
    Andresini, Giuseppina
    Appice, Annalisa
    Loglisci, Corrado
    Belvedere, Vincenzo
    Redavid, Domenico
    Malerba, Donato
    DISCOVERY SCIENCE (DS 2021), 2021, 12986 : 111 - 121