Confirmation method for the detection of malicious encrypted traffic with data privacy protection

In order to solve the problem that excessive false positives in the detection of encrypted malicious traffic based on machine learning, secure two-party computation was used to compare character segments between network traffic and intrusion detection rulers without revealing the data content.Based...

Full description

Saved in:
Bibliographic Details
Main Authors: Gaofeng HE, Qianfeng WEI, Xiancai XIAO, Haiting ZHU, Bingfeng XU
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2022-02-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2022034/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841539983672868864
author Gaofeng HE
Qianfeng WEI
Xiancai XIAO
Haiting ZHU
Bingfeng XU
author_facet Gaofeng HE
Qianfeng WEI
Xiancai XIAO
Haiting ZHU
Bingfeng XU
author_sort Gaofeng HE
collection DOAJ
description In order to solve the problem that excessive false positives in the detection of encrypted malicious traffic based on machine learning, secure two-party computation was used to compare character segments between network traffic and intrusion detection rulers without revealing the data content.Based on the comparison results, an intrusion detection feature matching algorithm was designed to accurately match keywords.A random verification strategy for users’ input was also proposed to facilitate the method.As a result, malicious users couldn’t use arbitrary data to participate in secure two-party calculations and avoid confirmation.The security and resource consumption of the method were theoretically analyzed and verified by a combination of real deployment and simulation experiments.The experimental results show that the proposed method can significantly improve the detection performance with low system resources.
format Article
id doaj-art-98b8e1097f1342c28c6371799e9e20af
institution Kabale University
issn 1000-436X
language zho
publishDate 2022-02-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-98b8e1097f1342c28c6371799e9e20af2025-01-14T06:29:33ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2022-02-014315617059394492Confirmation method for the detection of malicious encrypted traffic with data privacy protectionGaofeng HEQianfeng WEIXiancai XIAOHaiting ZHUBingfeng XUIn order to solve the problem that excessive false positives in the detection of encrypted malicious traffic based on machine learning, secure two-party computation was used to compare character segments between network traffic and intrusion detection rulers without revealing the data content.Based on the comparison results, an intrusion detection feature matching algorithm was designed to accurately match keywords.A random verification strategy for users’ input was also proposed to facilitate the method.As a result, malicious users couldn’t use arbitrary data to participate in secure two-party calculations and avoid confirmation.The security and resource consumption of the method were theoretically analyzed and verified by a combination of real deployment and simulation experiments.The experimental results show that the proposed method can significantly improve the detection performance with low system resources.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2022034/malicious encrypt trafficmachine learningsecure two-party computationautomatic confirmation
spellingShingle Gaofeng HE
Qianfeng WEI
Xiancai XIAO
Haiting ZHU
Bingfeng XU
Confirmation method for the detection of malicious encrypted traffic with data privacy protection
Tongxin xuebao
malicious encrypt traffic
machine learning
secure two-party computation
automatic confirmation
title Confirmation method for the detection of malicious encrypted traffic with data privacy protection
title_full Confirmation method for the detection of malicious encrypted traffic with data privacy protection
title_fullStr Confirmation method for the detection of malicious encrypted traffic with data privacy protection
title_full_unstemmed Confirmation method for the detection of malicious encrypted traffic with data privacy protection
title_short Confirmation method for the detection of malicious encrypted traffic with data privacy protection
title_sort confirmation method for the detection of malicious encrypted traffic with data privacy protection
topic malicious encrypt traffic
machine learning
secure two-party computation
automatic confirmation
url http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2022034/
work_keys_str_mv AT gaofenghe confirmationmethodforthedetectionofmaliciousencryptedtrafficwithdataprivacyprotection
AT qianfengwei confirmationmethodforthedetectionofmaliciousencryptedtrafficwithdataprivacyprotection
AT xiancaixiao confirmationmethodforthedetectionofmaliciousencryptedtrafficwithdataprivacyprotection
AT haitingzhu confirmationmethodforthedetectionofmaliciousencryptedtrafficwithdataprivacyprotection
AT bingfengxu confirmationmethodforthedetectionofmaliciousencryptedtrafficwithdataprivacyprotection