Passive, Transparent, and Selective TLS Decryption for Network Security Monitoring
نویسندگان
چکیده
More and more Internet traffic is encrypted. While this protects the confidentiality integrity of communication, it prevents network monitoring systems (NMS) from effectively analyzing now encrypted payloads. Many enterprise networks have deployed man-in-the-middle (MitM) proxies that intercept TLS connections at border to examine packet payloads regain visibility. However, interception via MitM often reduces connection security potentially introduces additional attack vectors. In paper, we present a cooperative approach in which endpoints selectively send keys NMS for decrypting connections. This enables hosts control an can decrypt lets users retain privacy chosen We implement prototype based on Zeek able receive key material hosts, connections, analyze cleartext. Meanwhile, our patch was merged into upstream will be part v4.3.0. evaluation, initially compare deduce significantly computational overhead. Furthermore, experimental results real-world indicate decryption adds runtime overhead 2.5 times compared analysis Additionally, when buffering only short amounts time NMS, all arrive completely 99,99% observed
منابع مشابه
On the Security of Generalized Selective Decryption
Generalized Selective Decryption (GSD) is an easy to define game based on a symmetric encryption scheme Enc. It was introduced by Panjwani [TCC’07] to capture the difficulty of proving adaptive security of certain protocols. In the GSD game there are n keys k1, . . . , kn, which the adversary may adaptively corrupt (i.e., learn); moreover, it can ask for encryptions Encki(kj) of keys under othe...
متن کاملProviding Dynamic Control to Passive Network Security Monitoring
Passive network intrusion detection systems detect a wide range of attacks, yet by themselves lack the capability to actively respond to what they find. Some sites thus provide their IDS with a separate control channel back to the network, typically by enabling it to dynamically insert ACLs into a gateway router for blocking IP addresses. Such setups, however, tend to remain narrowly tailored t...
متن کاملTransparent Network Security Policy Enforcement
Recent work in the area of network security, such as IPsec, provides mechanisms for securing the traÆc between any two interconnected hosts. However, it is not always possible, economical, or even practical from an administration and operational point of view to upgrade the software and con guration of all the nodes in a network to support such security protocols. One apparent solution to this ...
متن کاملA Proposed Algorithm to improve security & Efficiency of SSL-TLS servers using Batch RSA decryption
Today, Internet becomes the essential part of our lives. Over 90% of the e-commerce is developed on the Internet. A security algorithm became very necessary for producer-client transactions assurance and the financial applications safety (credit cards, etc.) The RSA algorithm applicability derives from algorithm properties like: confidentiality, safe authentication, data safety and integrity on...
متن کاملNetwork Working Group Netconf over Transport Layer Security (tls)
This document may contain material from IETF Documents or IETF Contributions published or made publicly available before November 10, 2008. The person(s) controlling the copyright in some of this material may not have granted the IETF Trust the right to allow modifications of such material outside the IETF Standards Process. Without obtaining an adequate license from the person(s) controlling t...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IFIP advances in information and communication technology
سال: 2022
ISSN: ['1868-422X', '1868-4238']
DOI: https://doi.org/10.1007/978-3-031-06975-8_6