Oblivious intrusion detection system
Intrusion Detection Systems (IDSs) are capable of monitoring network traffic and matching it
against rules. Obliv-ious IDSs perform the same tasks of IDSs while using encrypted rules …
against rules. Obliv-ious IDSs perform the same tasks of IDSs while using encrypted rules …
[HTML][HTML] Oblivious network intrusion detection systems
A main function of network intrusion detection systems (NIDSs) is to monitor network traffic
and match it against rules. Oblivious NIDSs (O-NIDS) perform the same tasks of NIDSs but …
and match it against rules. Oblivious NIDSs (O-NIDS) perform the same tasks of NIDSs but …
Encrypted Packet Inspection Based on Oblivious Transfer
X Jia, M Zhang - Security and Communication Networks, 2022 - Wiley Online Library
Deep packet inspection (DPI) is widely used in detecting abnormal traffic and suspicious
activities in networks. With the growing popularity of secure hypertext transfer protocol …
activities in networks. With the growing popularity of secure hypertext transfer protocol …
[PDF][PDF] A proposed intrusion detection system for encrypted computer networks
A computer system intrusion is seen as any set of actions that attempt to compromise the
integrity, confidentiality, or availability of a resource [1]. The introduction of networks and the …
integrity, confidentiality, or availability of a resource [1]. The introduction of networks and the …
Text search protocols with simulation based security
This paper presents an efficient protocol for securely computing the fundamental problem of
pattern matching. This problem is defined in the two-party setting, where party P 1 holds a …
pattern matching. This problem is defined in the two-party setting, where party P 1 holds a …
Accelerating IDS Using TLS Pre-Filter in FPGA
V Košař, L Šišmiš, J Matoušek… - 2023 IEEE Symposium …, 2023 - ieeexplore.ieee.org
Intrusion Detection Systems (IDSes) are a widely used network security tool. However,
achieving sufficient throughput is challenging as network link speeds increase to 100 or 400 …
achieving sufficient throughput is challenging as network link speeds increase to 100 or 400 …
Privacy preserving string matching for cloud computing
Cloud computing has become indispensable in providing highly reliable data services to
users. But, there are major concerns about the privacy of the data stored on cloud servers …
users. But, there are major concerns about the privacy of the data stored on cloud servers …
Intrusion detection over encrypted network data
Effective protection against cyber-attacks requires constant monitoring and analysis of
system data in an IT infrastructure, such as log files and network packets, which may contain …
system data in an IT infrastructure, such as log files and network packets, which may contain …
Privacy-preserving regular expression matching using nondeterministic finite automata
Motivated by the privacy requirements in network intrusion detection and DNS policy
checking, we have developed a suite of protocols and algorithms for regular expression …
checking, we have developed a suite of protocols and algorithms for regular expression …
Privacy-preserving multi-pattern matching
Multi-pattern matching compares a large set of patterns against a given query string, which
has wide application in various domains such as bio-informatics and intrusion detection …
has wide application in various domains such as bio-informatics and intrusion detection …