Towards Intrusion Detection for Encrypted Networks

Traditionally, network-based Intrusion Detection Systems (NIDS) monitor network traffic for signs of malicious activities. However, with the growing use of Virtual Private Networks (VPNs) that encrypt network traffic, the NIDS can no longer analyse the encrypted data. This essentially negates any protection offered by the NIDS. Although the encrypted traffic can be decrypted at a network gateway for analysis, this compromises on data confidentiality. In this paper, we propose a detection framework which allows a traditional NIDS to continue functioning, without compromising the confidentiality afforded by the VPN. Our approach uses Shamir's secret-sharing scheme and randomised network proxies to enable detection of malicious activities in encrypted channels. Additionally, this approach is able to detect any malicious attempts to forge network traffic with the intention of evading detection. Our experiments show that the probability of a successful evasion is low, at about 0.98% in the worst case. We implement our approach in a prototype and present some preliminary results. Overall, the proposed approach is able to consistently detect intrusions and does not introduce any additional false positives.

[1]  Daniele Piccitto Traffic Mining in IP Tunnels , 2008 .

[2]  William J. Buchanan,et al.  NetHost-Sensor: Investigating the capture of end-to-end encrypted intrusive data , 2006, Comput. Secur..

[3]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[4]  Alec Yasinsac,et al.  Analyzing Internet security protocols , 2001, Proceedings Sixth IEEE International Symposium on High Assurance Systems Engineering. Special Topic: Impact of Networking.

[5]  Tarik Taleb,et al.  Combating Against Attacks on Encrypted Protocols , 2007, 2007 IEEE International Conference on Communications.

[6]  Karl N. Levitt,et al.  DEMEM: Distributed Evidence-Driven Message Exchange Intrusion Detection Model for MANET , 2006, RAID.

[7]  Akira Yamada,et al.  Intrusion Detection for Encrypted Web Accesses , 2007, 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07).

[8]  Martin Roesch,et al.  Snort - Lightweight Intrusion Detection for Networks , 1999 .

[9]  Stephen R. Tate,et al.  ProtoMon: embedded monitors for cryptographic protocol intrusion detection and prevention , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..