iDeFEND: Intrusion detection framework for encrypted network data

Fatih Kilic, Claudia Eckert

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

6 Scopus citations

Abstract

Network Intrusion Detection Systems have been used for many years to inspect network data and to detect intruders. Nowadays, more and more often encryption is used to protect the confidentiality of network data. When end-to-end encryption is applied, Network Intrusion Detection Systems are blind and can not protect against attacks. In this paper we present iDeFEND, a framework for inspecting encrypted network data without breaking the security model of end-to-end encryption. Our approach does not require any source code of the involved applications and thereby also protects closed source applications. Our framework works independently of the utilized encryption key. We present two use cases how our framework can detect intruders by analysing the network data and how we can test remote applications with enabled network data encryption. To achieve this iDeFEND detects the relevant functions in the target application, extracts and subsequently inspects the data. To test remote applications iDeFEND intercepts and injects user controlled data into the application to test remote applications. Finally we have implemented our framework to show the feasibility of our approach.

Original languageEnglish
Title of host publicationCryptology and Network Security - 14th International Conference, CANS 2015, Proceedings
EditorsMichael Reiter, David Naccache
PublisherSpringer Verlag
Pages111-118
Number of pages8
ISBN (Print)9783319268224
DOIs
StatePublished - 2015
Event14th International Conference on Cryptology and Network Security, CANS 2015 - Marrakesh, Morocco
Duration: 10 Dec 201512 Dec 2015

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume9476
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference14th International Conference on Cryptology and Network Security, CANS 2015
Country/TerritoryMorocco
CityMarrakesh
Period10/12/1512/12/15

Keywords

  • Intrusion detection
  • Network security
  • Reverse engineering

Fingerprint

Dive into the research topics of 'iDeFEND: Intrusion detection framework for encrypted network data'. Together they form a unique fingerprint.

Cite this