2019
DOI: 10.1093/comjnl/bxz111
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion Detection Over Encrypted Network Data

Abstract: Effective protection against cyber-attacks requires constant monitoring and analysis of system data in an IT infrastructure, such as log files and network packets, which may contain private and sensitive information. Security operation centers (SOC), which are established to detect, analyze and respond to cyber-security incidents, often utilize detection models either for known types of attacks or for anomaly and applies them to the system data for detection. SOC are also motivated to keep their models private… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(3 citation statements)
references
References 10 publications
0
3
0
Order By: Relevance
“…Data Collection [37], [47], [80], [103], [104], [107], [111], [127]- [132] Analysis & Detection [13], [35], [41], [43], [55], [56], [84], [133]- [157] Presentation [9], [12], [13], [80], [97], [99], [112], [127], [158]- [170] V-B2). As the interface between people and machines, the presentation of data and analysis results is of particular interest in a SOC context.…”
Section: Technology Referencesmentioning
confidence: 99%
See 1 more Smart Citation
“…Data Collection [37], [47], [80], [103], [104], [107], [111], [127]- [132] Analysis & Detection [13], [35], [41], [43], [55], [56], [84], [133]- [157] Presentation [9], [12], [13], [80], [97], [99], [112], [127], [158]- [170] V-B2). As the interface between people and machines, the presentation of data and analysis results is of particular interest in a SOC context.…”
Section: Technology Referencesmentioning
confidence: 99%
“…In contrast, each detection approach class can be assigned an approach described in the literature, whereby a focus on statistics-and rule-based approaches is recognizable. To enhance detection independent of the utilized approach Karacy et al [133] propose a principle that allows intrusion detection even when end-to-end encryption was used and Smith [157] suggests that user behaviour analytics (UBA) should be used more intensively, since misused credentials are a great threat.…”
Section: ) Analysis and Detectionmentioning
confidence: 99%
“…Kim et al [8] proposed an Artificial Intelligence-based Intrusion Detection System (AIIDS), which is an optimal CNN-LSTM model based on spatial feature learning and successfully applied payload-level deep learning techniques in a highperformance computing environment. In order to better protect the privacy issues of the security operation centers, Khayati et al [14] developed a protocol for privately evaluating detection models on the system data, in which privacy of both the system data and detection models is protected and information leakage is either prevented altogether or quantifiably decreased.…”
Section: A Intrusion Detection Systemmentioning
confidence: 99%