Experimenting with an Intrusion Detection System for Encrypted Networks

  • Authors:
  • Vik Tor Goh;Jacob Zimmermann;Mark Looi

  • Affiliations:
  • Faculty of Science and Technology, Information Security Institute, Queensland University of Technology, GPO Box 2434, Brisbane QLD 4001, Australia.;Information Security Institute, Queensland University of Technology, MS-714, Level 7, 126 Margaret St, Brisbane QLD 4001, Australia.;Faculty of Science and Technology, Information Security Institute, Queensland University of Technology, GPO Box 2434, Brisbane QLD 4001, Australia

  • Venue:
  • International Journal of Business Intelligence and Data Mining
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

Network-based Intrusion Detection Systems (NIDSs) analyse network traffic to detect instances of malicious activity. Typically, this is only possible when the network traffic is accessible for analysis. With the growing use of Virtual Private Networks (VPNs) that encrypt network traffic, the NIDS can no longer access this crucial audit data. In this paper, we present an implementation and evaluation of our approach proposed in Goh et al. (2009). It is based on Shamir's secret-sharing scheme and allows a NIDS to function normally in a VPN without any modifications and without compromising the confidentiality afforded by the VPN.