Oblivious intrusion detection system

MA Sayed, M Taha - … on Hardware Oriented Security and Trust …, 2022 - ieeexplore.ieee.org
Intrusion Detection Systems (IDSs) are capable of monitoring network traffic and matching it
against rules. Obliv-ious IDSs perform the same tasks of IDSs while using encrypted rules …

[HTML][HTML] Oblivious network intrusion detection systems

MAH Sayed, M Taha - Scientific Reports, 2023 - nature.com
A main function of network intrusion detection systems (NIDSs) is to monitor network traffic
and match it against rules. Oblivious NIDSs (O-NIDS) perform the same tasks of NIDSs but …

Encrypted Packet Inspection Based on Oblivious Transfer

X Jia, M Zhang - Security and Communication Networks, 2022 - Wiley Online Library
Deep packet inspection (DPI) is widely used in detecting abnormal traffic and suspicious
activities in networks. With the growing popularity of secure hypertext transfer protocol …

[PDF][PDF] A proposed intrusion detection system for encrypted computer networks

N Kamel, N Hamdy, SH Ahmed - … International Conference on …, 2005 - nesreenahmed.com
A computer system intrusion is seen as any set of actions that attempt to compromise the
integrity, confidentiality, or availability of a resource [1]. The introduction of networks and the …

Text search protocols with simulation based security

R Gennaro, C Hazay, JS Sorensen - … on Practice and Theory in Public Key …, 2010 - Springer
This paper presents an efficient protocol for securely computing the fundamental problem of
pattern matching. This problem is defined in the two-party setting, where party P 1 holds a …

Accelerating IDS Using TLS Pre-Filter in FPGA

V Košař, L Šišmiš, J Matoušek… - 2023 IEEE Symposium …, 2023 - ieeexplore.ieee.org
Intrusion Detection Systems (IDSes) are a widely used network security tool. However,
achieving sufficient throughput is challenging as network link speeds increase to 100 or 400 …

Privacy preserving string matching for cloud computing

B Bezawada, AX Liu, B Jayaraman… - 2015 IEEE 35th …, 2015 - ieeexplore.ieee.org
Cloud computing has become indispensable in providing highly reliable data services to
users. But, there are major concerns about the privacy of the data stored on cloud servers …

Intrusion detection over encrypted network data

L Karaçay, E Savaş, H Alptekin - The Computer Journal, 2020 - ieeexplore.ieee.org
Effective protection against cyber-attacks requires constant monitoring and analysis of
system data in an IT infrastructure, such as log files and network packets, which may contain …

Privacy-preserving regular expression matching using nondeterministic finite automata

N Luo, C Weng, J Singh, G Tan, R Piskac… - Cryptology ePrint …, 2023 - eprint.iacr.org
Motivated by the privacy requirements in network intrusion detection and DNS policy
checking, we have developed a suite of protocols and algorithms for regular expression …

Privacy-preserving multi-pattern matching

T Zhang, X Wang, SSM Chow - … 2016, Guangzhou, China, October 10-12 …, 2017 - Springer
Multi-pattern matching compares a large set of patterns against a given query string, which
has wide application in various domains such as bio-informatics and intrusion detection …