Journal on Communications ›› 2022, Vol. 43 ›› Issue (2): 156-170.doi: 10.11959/j.issn.1000-436x.2022034

• Papers • Previous Articles     Next Articles

Confirmation method for the detection of malicious encrypted traffic with data privacy protection

Gaofeng HE1, Qianfeng WEI1, Xiancai XIAO1, Haiting ZHU1, Bingfeng XU2   

  1. 1 School of Internet of Things, Nanjing University of Posts and Telecommunications, Nanjing 210003, China
    2 College of Information Science and Technology, Nanjing Forestry University, Nanjing 210042, China
  • Revised:2022-01-19 Online:2022-02-25 Published:2022-02-01
  • Supported by:
    The National Natural Science Foundation of China(61802192);The National Natural Science Foundation of China(61702282);The Natural Science Foundation of Nanjing University of Posts and Telecommunications(NY221096);The Fundamental Research Funds for the Central Universities, NUAA(NJ2020022)

Abstract:

In order to solve the problem that excessive false positives in the detection of encrypted malicious traffic based on machine learning, secure two-party computation was used to compare character segments between network traffic and intrusion detection rulers without revealing the data content.Based on the comparison results, an intrusion detection feature matching algorithm was designed to accurately match keywords.A random verification strategy for users’ input was also proposed to facilitate the method.As a result, malicious users couldn’t use arbitrary data to participate in secure two-party calculations and avoid confirmation.The security and resource consumption of the method were theoretically analyzed and verified by a combination of real deployment and simulation experiments.The experimental results show that the proposed method can significantly improve the detection performance with low system resources.

Key words: malicious encrypt traffic, machine learning, secure two-party computation, automatic confirmation

CLC Number: 

No Suggested Reading articles found!