PRI: Privacy Preserving Inspection of Encrypted Network Traffic

被引:7
作者
Schiff, Liron [1 ]
Schmid, Stefan [2 ]
机构
[1] Tel Aviv Univ, Tel Aviv, Israel
[2] Aalborg Univ, Aalborg, Denmark
来源
2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2016) | 2016年
关键词
D O I
10.1109/SPW.2016.34
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Traffic inspection is a fundamental building block of many security solutions today. For example, to prevent the leakage or exfiltration of confidential insider information, as well as to block malicious traffic from entering the network, most enterprises today operate intrusion detection and prevention systems that inspect traffic. However, the state-of-theart inspection systems do not reflect well the interests of the different involved autonomous roles. For example, employees in an enterprise, or a company outsourcing its network management to a specialized third party, may require that their traffic remains confidential, even from the system administrator. Moreover, the rules used by the intrusion detection system, or more generally the configuration of an online or offline anomaly detection engine, may be provided by a third party, e.g., a security research firm, and can hence constitute a critical business asset which should be kept confidential. Today, it is often believed that accounting for these additional requirements is impossible, as they contradict efficiency and effectiveness. We in this paper explore a novel approach, called Privacy Preserving Inspection (PRI), which provides a solution to this problem, by preserving privacy of traffic inspection and confidentiality of inspection rules and configurations, and e.g., also supports the flexible installation of additional Data Leak Prevention (DLP) rules specific to the company.
引用
收藏
页码:296 / 303
页数:8
相关论文
共 28 条
[1]   Keys Under Doormats [J].
Abelson, Harold Hal ;
Anderson, Ross ;
Bellovin, Steven M. ;
Benaloh, Josh ;
Blaze, Matt ;
Diffie, Whitfield Whit ;
Gilmore, John ;
Green, Matthew ;
Landau, Susan ;
Neumann, Peter G. ;
Rivest, Ronald L. ;
Schiller, Jeffrey I. ;
Schneier, Bruce ;
Specter, Michael A. ;
Weitzner, Daniel J. .
COMMUNICATIONS OF THE ACM, 2015, 58 (10) :24-26
[2]  
Anati I., 2013, P HASP
[3]  
[Anonymous], 2015, P 2015 ACM C SPECIAL, DOI [10.1145/2785956, DOI 10.1145/2785956]
[4]  
Barrios R., 2013, MULTILEVELED APPROAC
[5]   Shielding Applications from an Untrusted Cloud with Haven [J].
Baumann, Andrew ;
Peinado, Marcus ;
Hunt, Galen .
ACM TRANSACTIONS ON COMPUTER SYSTEMS, 2015, 33 (03)
[6]  
Belshe Mike, 2015, Hypertext transfer protocol version 2 (http/2)
[7]  
Brdiczka O., 2012, 2012 IEEE S SECURITY, P142
[8]  
Cappelli D., 2008, COMMON SENSE GUIDE P
[9]  
Costa D, 2013, CMUSEI2013TN012
[10]  
Einwechter N., 2002, SECURITYFOCUS MAR