Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.5555/1894166.1894209guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Security system for encrypted environments (S2E2)

Published: 15 September 2010 Publication History

Abstract

The percentage of encrypted network traffic increases steadily not only by virtual private networks of companies but also by protocols like SSH or SSL in the private sector. Traditional intrusion detection systems (IDS) are not able to cope with encrypted traffic. There are a few systems which are able to handle encrypted lines but none of them is applicable in general because of changed network protocols, a restricted application range (e.g., only able to find protocol-specific attacks) or very high false alarm rates. We propose a new IDS for non-intrusive, behavior-based intrusion- and extrusion detection in encrypted environments.

References

[1]
Lippmann, R., Webster, S., Stetson, D.: The Effect of Identifying Vulnerabilities and Patching Software on the Utility of Network Intrusion Detection. In: Wespi, A., Vigna, G., Deri, L. (eds.) RAID 2002. LNCS, vol. 2516, p. 307. Springer, Heidelberg (2002).
[2]
Goh, V.T., Zimmermann, J., Looi, M.: Experimenting with an Intrusion Detection System for Encrypted Networks. Int. J. Business Intelligence and Data Mining 5(2), 172-191 (2010).

Cited By

View all
  • (2012)SSHCureProceedings of the 6th IFIP WG 6.6 international autonomous infrastructure, management, and security conference on Dependable Networks and Services10.1007/978-3-642-30633-4_11(86-97)Online publication date: 4-Jun-2012

Index Terms

  1. Security system for encrypted environments (S2E2)
      Index terms have been assigned to the content through auto-classification.

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image Guide Proceedings
      RAID'10: Proceedings of the 13th international conference on Recent advances in intrusion detection
      September 2010
      517 pages
      ISBN:3642155111
      • Editors:
      • Somesh Jha,
      • Robin Sommer,
      • Christian Kreibich

      Publisher

      Springer-Verlag

      Berlin, Heidelberg

      Publication History

      Published: 15 September 2010

      Author Tags

      1. data leakage detection
      2. extrusion detection
      3. intrusion detection
      4. non-intrusive measurement
      5. payload encryption
      6. traffic clustering
      7. user strategy

      Qualifiers

      • Article

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)0
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 17 Oct 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2012)SSHCureProceedings of the 6th IFIP WG 6.6 international autonomous infrastructure, management, and security conference on Dependable Networks and Services10.1007/978-3-642-30633-4_11(86-97)Online publication date: 4-Jun-2012

      View Options

      View options

      Get Access

      Login options

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media