{"title":"加密数据端口扫描检测的可行性研究","authors":"P. Chandrashekar, Sashank Dara, V. Muralidhara","doi":"10.1109/CCEM.2015.18","DOIUrl":null,"url":null,"abstract":"We explore the feasibility of implementing port scan detection on encrypted data to protect confidentiality of sensitive network data. We experiment with four popular Port Scan detection algorithms namely Classic Version (and its Time Variant), Threshold Random Walk (TRW), Bayesian Logistic Regression (BLR). We also provide experimental results on performance and storage of our query based implementation on network flow data. Our key observation is that for complex operations on encrypted data Onion-layered encryption system like Crypt DB does not scale well.","PeriodicalId":339923,"journal":{"name":"2015 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM)","volume":"108 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Feasibility Study of Port Scan Detection on Encrypted Data\",\"authors\":\"P. Chandrashekar, Sashank Dara, V. Muralidhara\",\"doi\":\"10.1109/CCEM.2015.18\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"We explore the feasibility of implementing port scan detection on encrypted data to protect confidentiality of sensitive network data. We experiment with four popular Port Scan detection algorithms namely Classic Version (and its Time Variant), Threshold Random Walk (TRW), Bayesian Logistic Regression (BLR). We also provide experimental results on performance and storage of our query based implementation on network flow data. Our key observation is that for complex operations on encrypted data Onion-layered encryption system like Crypt DB does not scale well.\",\"PeriodicalId\":339923,\"journal\":{\"name\":\"2015 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM)\",\"volume\":\"108 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CCEM.2015.18\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCEM.2015.18","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Feasibility Study of Port Scan Detection on Encrypted Data
We explore the feasibility of implementing port scan detection on encrypted data to protect confidentiality of sensitive network data. We experiment with four popular Port Scan detection algorithms namely Classic Version (and its Time Variant), Threshold Random Walk (TRW), Bayesian Logistic Regression (BLR). We also provide experimental results on performance and storage of our query based implementation on network flow data. Our key observation is that for complex operations on encrypted data Onion-layered encryption system like Crypt DB does not scale well.