Oblivious Intrusion Detection System

Mahmoud Abdelhafeez, Mostafa M. I. Taha
{"title":"Oblivious Intrusion Detection System","authors":"Mahmoud Abdelhafeez, Mostafa M. I. Taha","doi":"10.1109/HOST54066.2022.9840140","DOIUrl":null,"url":null,"abstract":"Intrusion Detection Systems (IDSs) are capable of monitoring network traffic and matching it against rules. Obliv-ious IDSs perform the same tasks of IDSs while using encrypted rules and producing encrypted results without being able to decrypt the rules or the results. Current implementations to this technology suffer from slow searching speeds and/or lack of generality. In this paper we present a generic approach to implement privacy-preserving intrusion detection system based on hybrid binary gates along with an application algorithm for hybrid text matching. Benchmarking showed a wide variety of trade-offs with minimum searching time of 897 msecs for 1-byte encrypted rule through 10- bytes plaintext.","PeriodicalId":222250,"journal":{"name":"2022 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/HOST54066.2022.9840140","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

Intrusion Detection Systems (IDSs) are capable of monitoring network traffic and matching it against rules. Obliv-ious IDSs perform the same tasks of IDSs while using encrypted rules and producing encrypted results without being able to decrypt the rules or the results. Current implementations to this technology suffer from slow searching speeds and/or lack of generality. In this paper we present a generic approach to implement privacy-preserving intrusion detection system based on hybrid binary gates along with an application algorithm for hybrid text matching. Benchmarking showed a wide variety of trade-offs with minimum searching time of 897 msecs for 1-byte encrypted rule through 10- bytes plaintext.
遗忘入侵检测系统
入侵检测系统(ids)能够监控网络流量并根据规则进行匹配。隐性入侵防御系统执行与入侵防御系统相同的任务,同时使用加密的规则并生成加密的结果,而不能够解密规则或结果。该技术的当前实现存在搜索速度慢和/或缺乏通用性的问题。本文提出了一种基于混合二进制门的保护隐私入侵检测系统的通用实现方法,并给出了混合文本匹配的应用算法。基准测试显示了各种各样的权衡,从1字节加密规则到10字节明文的最小搜索时间为897毫秒。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信