• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations

Privacy-Preserving Collaborative Anomaly Detection

by Haakon Andreas Ringberg
Add To MetaCart

Tools

Sorted by:
Results 1 - 6 of 6

SEPIA: Privacy-Preserving Aggregation of Multi-Domain Network Events and Statistics

by Martin Burkhart, Mario Strasser, Dilip Many, Xenofontas Dimitropoulos - USENIX SECURITY SYMPOSIUM , 2010
"... Secure multiparty computation (MPC) allows joint privacy-preserving computations on data of multiple parties. Although MPC has been studied substantially, building solutions that are practical in terms of computation and communication cost is still a major challenge. In this paper, we investigate th ..."
Abstract - Cited by 48 (2 self) - Add to MetaCart
Secure multiparty computation (MPC) allows joint privacy-preserving computations on data of multiple parties. Although MPC has been studied substantially, building solutions that are practical in terms of computation and communication cost is still a major challenge. In this paper, we investigate the practical usefulness of MPC for multi-domain network security and monitoring. We first optimize MPC comparison operations for processing high volume data in near real-time. We then design privacy-preserving protocols for event correlation and aggregation of network traffic statistics, such as addition of volume metrics, computation of feature entropy, and distinct item count. Optimizing performance of parallel invocations, we implement our protocols along with a complete set of basic operations in a library called SEPIA. We evaluate the running time and bandwidth requirements of our protocols in realistic settings on a local cluster as well as on PlanetLab and show that they work in near real-time for up to 140 input providers and 9 computation nodes. Compared to implementations using existing general-purpose MPC frameworks, our protocols are significantly faster, requiring, for example, 3 minutes for a task that takes 2 days with general-purpose frameworks. This improvement paves the way for new applications of MPC in the area of networking. Finally, we run SEPIA’s protocols on real traffic traces of 17 networks and show how they provide new possibilities for distributed troubleshooting and early anomaly detection.
(Show Context)

Citation Context

...orrelation, e.g., with DOMINO [49], requires the joint analysis of private alerts. Similary, aggregation of private data is useful for alert signature extraction [30], collaborative anomaly detection =-=[34]-=-, multi-domain traffic engineering [27], detecting traffic discrimination [45], and collecting network performance statistics [42]. All these approaches use either a trusted third party, e.g., a unive...

Privacy-preserving distributed network troubleshooting? bridging the gap between theory and practice

by Martin Burkhart, Xenofontas Dimitropoulos, Eth Zurich - ACM Trans. Inf. Syst. Secur , 2008
"... Today, there is a fundamental imbalance in cybersecurity. While attackers act more andmore globally and co-ordinated, network defense is limited to examine local information only due to privacy concerns. To overcome this privacy barrier, we use secure multiparty computation (MPC) for the problem of ..."
Abstract - Cited by 3 (0 self) - Add to MetaCart
Today, there is a fundamental imbalance in cybersecurity. While attackers act more andmore globally and co-ordinated, network defense is limited to examine local information only due to privacy concerns. To overcome this privacy barrier, we use secure multiparty computation (MPC) for the problem of aggregating network data from multiple domains. We first optimize MPC comparison operations for processing high volume data in near real-time by not enforcing protocols to run in a constant number of synchronization rounds. We then implement a complete set of basic MPC primitives in the SEPIA library. For parallel invocations, SEPIA’s ba-sic operations are between 35 and several hundred times faster than those of comparable MPC frameworks. Using these operations, we develop four protocols tailored for distributed network monitoring and security applications: the entropy, distinct count, event correlation, and top-k protocols. Extensive evaluation shows that the protocols are suitable for near real-time data aggregation. For example, our top-k protocol PPTKS accurately aggregates counts for 180,000 distributed IP addresses in only a few minutes. Finally, we use SEPIA with real traffic data from 17 customers of a backbone network to collaboratively detect, analyze, and mitigate distributed anomalies. Our work follows a path starting from theory, going to system design, performance evaluation, and ending with measurement. Along this way, it makes a first effort to bridge two

Zids: A privacy-preserving intrusion detection system using secure two-party computation protocols. The Computer Journal

by Salman Niksefat, Babak Sadeghiyan, Payman Mohassel, Saeed Sadeghian , 2013
"... We introduce ZIDS, a client-server solution for private detection of intrusions that is suitable for private detection of zero-day attacks in input data. The system includes an intrusion detection system (IDS) server that has a set of sensitive signatures for zero-day attacks and IDS clients that po ..."
Abstract - Cited by 1 (1 self) - Add to MetaCart
We introduce ZIDS, a client-server solution for private detection of intrusions that is suitable for private detection of zero-day attacks in input data. The system includes an intrusion detection system (IDS) server that has a set of sensitive signatures for zero-day attacks and IDS clients that possess some sensitive data (e.g. files, logs). Using ZIDS, each IDS client learns whether its input data matche any of the zero-day signatures, but neither party learns about any additional information. In other words, the IDS client learns nothing about the zero-day signatures and the IDS server learns nothing about the input data and the analysis results. To solve this problem, we reduce privacy-preserving intrusion detection to an instance of secure two-party oblivious deterministic finite automata (ODFA) evaluation. Then, motivated by the fact that the DFAs associated with attack signature are often sparse, we propose a new and efficient ODFA protocol that takes advantage of this sparsity. Our new construction is considerably more efficient than the existing solutions and, at the same time, does not leak any sensitive information about the nature of the sparsity in the private DFA. We provide a full implementation of our privacy-preserving system that includes optimizations that lead to better memory usage and evaluate its performance on rule sets from the Snort IDS.

doi:10.1093/comjnl/bxt019 ZIDS: A Privacy-Preserving Intrusion Detection System Using Secure Two-Party Computation Protocols

by Salman Niksefat, Babak Sadeghiyan, Payman Mohassel, Saeed Sadeghian , 2012
"... We introduce ZIDS, a client-server solution for private detection of intrusions that is suitable for private detection of zero-day attacks in input data. The system includes an intrusion detection system (IDS) server that has a set of sensitive signatures for zero-day attacks and IDS clients that po ..."
Abstract - Add to MetaCart
We introduce ZIDS, a client-server solution for private detection of intrusions that is suitable for private detection of zero-day attacks in input data. The system includes an intrusion detection system (IDS) server that has a set of sensitive signatures for zero-day attacks and IDS clients that possess some sensitive data (e.g. files, logs). Using ZIDS, each IDS client learns whether its input data matche any of the zero-day signatures, but neither party learns about any additional information. In other words, the IDS client learns nothing about the zero-day signatures and the IDS server learns nothing about the input data and the analysis results. To solve this problem, we reduce privacy-preserving intrusion detection to an instance of secure two-party oblivious deterministic finite automata (ODFA) evaluation. Then, motivated by the fact that the DFAs associated with attack signature are often sparse, we propose a new and efficient ODFA protocol that takes advantage of this sparsity. Our new construction is considerably more efficient than the existing solutions and, at the same time, does not leak any sensitive information about the nature of the sparsity in the private DFA. We provide a full implementation of our privacy-preserving system that includes optimizations that lead to better memory usage and evaluate its performance on rule sets from the Snort IDS.

Fe

by Martin Burkhart, Mario Strasser, Dilip Many, Xenofontas Dimitropoulos , 2009
"... ar ..."
Abstract - Add to MetaCart
Abstract not found
(Show Context)

Citation Context

...orrelation, e.g., with DOMINO [44], requires the joint analysis of private alerts. Similary, aggregation of private data is useful for alert signature extraction [26], collaborative anomaly detection =-=[30]-=-, multidomain traffic engineering [23], detecting traffic discrimination [40], and collecting network performance statistics [37]. All these approaches use either a trusted third party, e.g., a Univer...

Efficient and effective automated

by Tarem Ahmed, Xianglin Wei, Supriyo Ahmed, Al-sakib Khan Pathan
"... surveillance agents using kernel tricks ..."
Abstract - Add to MetaCart
surveillance agents using kernel tricks
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University