Digitala Vetenskapliga Arkivet

Ändra sökning
RefereraExporteraLänk till posten
Permanent länk

Direktlänk
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annat format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annat språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf
Life of a Security Middlebox: Challenges with Emerging Protocols and Technologies
Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), Institutionen för matematik och datavetenskap (from 2013).ORCID-id: 0000-0001-9886-6651
2020 (Engelska)Doktorsavhandling, sammanläggning (Övrigt vetenskapligt)
Abstract [en]

The Internet of today has intermediary devices known as middleboxes that perform more functions than the normal packet forwarding function of a router. Security middleboxes are a subset of these middleboxes and face an increasingly difficult task to perform their functions correctly. These middleboxes make many assumptions about the traffic that may not hold true any longer with the advent of new protocols such as MPTCP and technologies like end-to-end encryption.

The work in this thesis focuses on security middleboxes and the challenges they face. We develop methods and solutions to help these security middleboxes continue to function correctly. In particular, we investigate the case of using MPTCP over traditional security infrastructure as well as the case of end-to-end encryption. We study how practical it is to evade a security middlebox by fragmenting and sending traffic across multiple paths using MPTCP. We then go on to propose possible solutions to detect such attacks and implement them. The potential MPTCP scenario where security middleboxes only have access to part of the traffic is also investigated and addressed. Moreover, the thesis contributes a machine learning based approach to help security middleboxes detect malware in encrypted traffic without decryption.

Abstract [en]

The Internet of today has intermediary devices known as middleboxes thatperform more functions than the normal packet forwarding function of arouter. Security middleboxes are a subset of these middleboxes and face anincreasingly difficult task to perform their functions correctly in the wake ofemerging protocols and technologies on the Internet. Security middleboxesmake many assumptions about the traffic, e.g., they assume that traffic froma single connection always arrives over the same path and they often expectto observe plaintext data. These along with many other assumptions may nothold true any longer with the advent of new protocols such as MPTCP andtechnologies like end-to-end encryption.

The work in this thesis focuses on security middleboxes and the challengesthey face in performing their functions in an evolving Internet where newnetworking protocols and technologies are regularly introduced. We developmethods and solutions to help these security middleboxes continue to functioncorrectly. In particular, we investigate the case of using MPTCP overtraditional security infrastructure as well as the case of end-to-end encryption.

We study how practical it is to evade a security middlebox by fragmentingand sending traffic across multiple paths using MPTCP. Attack traffic that isgenerated from a self-developed tool is used to evaluate such attacks to showthat these attacks are feasible. We then go on to propose possible solutionsto detect such attacks and implement them. The potential MPTCP scenariowhere security middleboxes only have access to part of the traffic is also investigated.Furthermore, we propose and implement an algorithm to performintrusion detection in such situations. Moreover, the thesis contributes a machinelearning based approach to help security middleboxes detect malware inencrypted traffic without decryption.

Ort, förlag, år, upplaga, sidor
Karlstad: Karlstads universitet, 2020. , s. 26
Serie
Karlstad University Studies, ISSN 1403-8099 ; 2020:10
Nyckelord [en]
network security, TCP, MPTCP, IDS, Snort, edit-distance, encryption
Nationell ämneskategori
Elektroteknik och elektronik
Forskningsämne
Datavetenskap
Identifikatorer
URN: urn:nbn:se:kau:diva-76291ISBN: 978-91-7867-093-2 (tryckt)ISBN: 978-91-7867-103-8 (digital)OAI: oai:DiVA.org:kau-76291DiVA, id: diva2:1385548
Disputation
2020-02-28, 21A342, Eva Erikssonsalen, Karlstad, 10:15 (Engelska)
Opponent
Handledare
Anmärkning

Article 5 part of thesis as manuscricpt, now published.

Tillgänglig från: 2020-02-05 Skapad: 2020-01-14 Senast uppdaterad: 2021-06-07Bibliografiskt granskad
Delarbeten
1. Multipath TCP IDS Evasion and Mitigation
Öppna denna publikation i ny flik eller fönster >>Multipath TCP IDS Evasion and Mitigation
2015 (Engelska)Ingår i: Information Security: 18th International Conference, ISC 2015, Trondheim, Norway, September 9-11, 2015, Proceedings / [ed] Javier Lopez & Chris J. Mitchell, Springer, 2015, Vol. 9290, s. 265-282Konferensbidrag, Publicerat paper (Refereegranskat)
Abstract [en]

The existing network security infrastructure is not ready for future protocols such as Multipath TCP (MPTCP). The outcome is that middleboxes are configured to block such protocols. This paper studies the security risk that arises if future protocols are used over unaware infrastructures. In particular, the practicality and severity of cross-path fragmentation attacks utilizing MPTCP against the signature-matching capability of the Snort intrusion detection system (IDS) is investigated. Results reveal that the attack is realistic and opens the possibility to evade any signature-based IDS. To mitigate the attack, a solution is also proposed in the form of the MPTCP Linker tool. The work outlines the importance of MPTCP support in future network security middleboxes.

Ort, förlag, år, upplaga, sidor
Springer, 2015
Serie
Lecture Notes in Computer Science, ISSN 0302-9743 ; 9290
Nationell ämneskategori
Datavetenskap (datalogi)
Forskningsämne
Datavetenskap
Identifikatorer
urn:nbn:se:kau:diva-39058 (URN)10.1007/978-3-319-23318-5_15 (DOI)000363678700015 ()978-3-319-23317-8 (ISBN)
Konferens
The 18th Information Security Conference (ISC), Trondheim, Norway, September 9-11, 2015.
Projekt
HITS, 4707
Forskningsfinansiär
KK-stiftelsen
Tillgänglig från: 2016-01-18 Skapad: 2016-01-18 Senast uppdaterad: 2020-01-14Bibliografiskt granskad
2. Towards Multipath TCP Aware Security Technologies
Öppna denna publikation i ny flik eller fönster >>Towards Multipath TCP Aware Security Technologies
2016 (Engelska)Ingår i: 2016 8th IFIP International Conference onNew Technologies, Mobility and Security (NTMS), New York: IEEE, 2016, s. 1-8Konferensbidrag, Publicerat paper (Refereegranskat)
Abstract [en]

Multipath TCP (MPTCP) is a proposed extension to TCP that enables a number of performance advantages that have not been offered before. While the protocol specification is close to being finalized, there still remain some unaddressed challenges regarding the deployment and security implications of the protocol. This work attempts to tackle some of these concerns by proposing and implementing MPTCP aware security services and deploying them inside a proof of concept MPTCP proxy. The aim is to enable hosts, even those without native MPTCP support, to securely benefit from the MPTCP performance advantages. Our evaluations show that the security services that are implemented enable proper intrusion detection and prevention to thwart potential attacks as well as threshold rules to prevent denial of service (DoS) attacks.

Ort, förlag, år, upplaga, sidor
New York: IEEE, 2016
Nationell ämneskategori
Datavetenskap (datalogi)
Identifikatorer
urn:nbn:se:kau:diva-47594 (URN)10.1109/NTMS.2016.7792485 (DOI)000391578700063 ()978-1-5090-2914-3 (ISBN)
Konferens
8th IFIP International Conference on New Technologies, Mobility and Security (NTMS), Larnaca, Cyprus 21-23 November 2016
Projekt
HITS, 4707
Forskningsfinansiär
KK-stiftelsen
Tillgänglig från: 2017-01-06 Skapad: 2017-01-06 Senast uppdaterad: 2020-01-14Bibliografiskt granskad
3. Slice Distance: An Insert-Only Levenshtein Distance with a Focus on Security Applications
Öppna denna publikation i ny flik eller fönster >>Slice Distance: An Insert-Only Levenshtein Distance with a Focus on Security Applications
2018 (Engelska)Ingår i: Proceedings of NTMS 2018 Conference and Workshop, New York: IEEE, 2018, s. 1-5Konferensbidrag, Publicerat paper (Refereegranskat)
Abstract [en]

Levenshtein distance is well known for its use in comparing two strings for similarity. However, the set of considered edit operations used when comparing can be reduced in a number of situations. In such cases, the application of the generic Levenshtein distance can result in degraded detection and computational performance. Other metrics in the literature enable limiting the considered edit operations to a smaller subset. However, the possibility where a difference can only result from deleted bytes is not yet explored. To this end, we propose an insert-only variation of the Levenshtein distance to enable comparison of two strings for the case in which differences occur only because of missing bytes. The proposed distance metric is named slice distance and is formally presented and its computational complexity is discussed. We also provide a discussion of the potential security applications of the slice distance.

Ort, förlag, år, upplaga, sidor
New York: IEEE, 2018
Nyckelord
Measurement, Pattern matching, Time complexity, Transforms, Security, DNA
Nationell ämneskategori
Datavetenskap (datalogi)
Forskningsämne
Datavetenskap
Identifikatorer
urn:nbn:se:kau:diva-67012 (URN)10.1109/NTMS.2018.8328718 (DOI)000448864200049 ()978-1-5386-3662-6 (ISBN)978-1-5386-3663-3 (ISBN)
Konferens
9th IFIP International Conference on New Technologies, Mobility and Security, 26-28 February 2018, Paris, France
Projekt
HITS, 4707
Forskningsfinansiär
KK-stiftelsen, 4707
Tillgänglig från: 2018-04-17 Skapad: 2018-04-17 Senast uppdaterad: 2020-01-14Bibliografiskt granskad
4. Using Partial Signatures in Intrusion Detection for Multipath TCP
Öppna denna publikation i ny flik eller fönster >>Using Partial Signatures in Intrusion Detection for Multipath TCP
2019 (Engelska)Ingår i: Secure IT-systems: 24th Nordic Conference, NordSec 2019, Aalborg, Denmark, November 18–20, 2019, Proceedings / [ed] Aslan Askarov, René Rydhof Hansen, Willard Rafnsson, Cham, Switzerland: Springer, 2019, s. 71-86Konferensbidrag, Publicerat paper (Refereegranskat)
Abstract [en]

Traditional security mechanisms such as signature basedintrusion detection systems (IDSs) attempt to find a perfect match of aset of signatures in network traffic. Such IDSs depend on the availabilityof a complete application data stream. With emerging protocols such asMultipath TCP (MPTCP), this precondition cannot be ensured, result-ing in false negatives and IDS evasion. On the other hand, if approximatesignature matching is used instead in an IDS, a potentially high numberof false positives make the detection impractical. In this paper, we showthat, by using a specially tailored partial signature matcher and knowl-edge about MPTCP semantics, the Snort3 IDS can be empowered withpartial signature detection. Additionally, we uncover the type of Snort3rules suitable for the task of partial matching. Experimental results withthese rules show a low false positive rate for benign traffic and highdetection coverage for attack traffic.

Ort, förlag, år, upplaga, sidor
Cham, Switzerland: Springer, 2019
Serie
Lecture Notes in Computer Science, ISSN 0302-9743 ; 11875
Nationell ämneskategori
Datavetenskap (datalogi)
Forskningsämne
Datavetenskap; Datavetenskap
Identifikatorer
urn:nbn:se:kau:diva-75755 (URN)10.1007/978-3-030-35055-0_5 (DOI)
Konferens
NordSec2019: 24th Nordic Conference on Secure IT Systems, 18-20 November, 2019, Aalborg, Denmark,
Projekt
HITS, 4707
Forskningsfinansiär
KK-stiftelsen
Tillgänglig från: 2019-11-14 Skapad: 2019-11-14 Senast uppdaterad: 2020-06-18Bibliografiskt granskad
5. Using Features of Encrypted Network Traffic to Detect Malware
Öppna denna publikation i ny flik eller fönster >>Using Features of Encrypted Network Traffic to Detect Malware
2021 (Engelska)Ingår i: Secure IT Systems: 25th Nordic Conference, NordSec 2020, Virtual Event, November 23–24, 2020, Proceedings / [ed] Mikael Asplund; Simin Nadjm-Tehrani, Springer Publishing Company, 2021Konferensbidrag, Publicerat paper (Refereegranskat)
Abstract [en]

Encryption on the Internet is as pervasive as ever. This hasprotected communications and enhanced the privacy of users. Unfortu-nately, at the same time malware is also increasingly using encryptionto hide its operation. The detection of such encrypted malware is cru-cial, but the traditional detection solutions assume access to payloaddata. To overcome this limitation, such solutions employ traffic decryp-tion strategies that have severe drawbacks. This paper studies the usageof encryption for malicious and benign purposes using large datasets andproposes a machine learning based solution to detect malware using con-nection and TLS metadata without any decryption. The classification isshown to be highly accurate with high precision and recall rates by usinga small number of features. Furthermore, we consider the deployment as-pects of the solution and discuss different strategies to reduce the falsepositive rate.

Ort, förlag, år, upplaga, sidor
Springer Publishing Company, 2021
Serie
Lecture Notes in Computer Science, ISSN 0302-9743, E-ISSN 1611-3349 ; 12556
Nyckelord
malware, encryption, TLS, detection, machine learning
Nationell ämneskategori
Data- och informationsvetenskap
Forskningsämne
Datavetenskap
Identifikatorer
urn:nbn:se:kau:diva-81466 (URN)10.1007/978-3-030-70852-8_3 (DOI)2-s2.0-85103538148 (Scopus ID)978-3-030-70851-1 (ISBN)978-3-030-70852-8 (ISBN)
Konferens
The 25th Nordic Conference on Secure IT Systems (NordSec 2020)
Projekt
High Quality Networked Services in a Mobile WorldHITS
Forskningsfinansiär
KK-stiftelsen, 20140037
Anmärkning

Artikeln ingick som manuskript i Afzals (2020) doktorsavhandling Life of a Security Middlebox: Challenges with Emerging Protocols and Technologies

Tillgänglig från: 2020-11-24 Skapad: 2020-11-24 Senast uppdaterad: 2021-06-07Bibliografiskt granskad
6. IDS rule management made easy
Öppna denna publikation i ny flik eller fönster >>IDS rule management made easy
2016 (Engelska)Ingår i: Electronics, Computers and Artificial Intelligence (ECAI), 2016 8th International Conference on, IEEE, 2016Konferensbidrag, Publicerat paper (Refereegranskat)
Abstract [en]

Signature-based intrusion detection systems (IDSs) are commonly utilized in enterprise networks to detect and possibly block a wide variety of attacks. Their application in industrial control systems (ICSs) is also growing rapidly as modem ICSs increasingly use open standard protocols instead of proprietary. Due to an ever changing threat landscape, the rulesets used by these IDSs have grown large and there is no way to verify their precision or accuracy. Such broad and non-optimized rulesets lead to false positives and an unnecessary burden on the IDS, resulting in possible degradation of the security. This work proposes a methodology consisting of a set of tools to help optimize the IDS rulesets and make rule management easier. The work also provides attack traffic data that is expected to benefit the task of IDS assessment.

Ort, förlag, år, upplaga, sidor
IEEE, 2016
Serie
International Conference on Electronics Computers and Artificial Intelligence, ISSN 2378-7147
Nationell ämneskategori
Datavetenskap (datalogi)
Identifikatorer
urn:nbn:se:kau:diva-48016 (URN)10.1109/ECAI.2016.7861119 (DOI)000402541200055 ()978-1-5090-2048-5 (ISBN)978-1-5090-2047-8 (ISBN)
Konferens
8th International Conference on Electronics, Computers and Artificial Intelligence (ECAI), 30 June-2 July 2016, Ploiesti, Romania
Projekt
HITS, 4707
Forskningsfinansiär
KK-stiftelsen
Tillgänglig från: 2017-02-24 Skapad: 2017-02-24 Senast uppdaterad: 2020-01-14Bibliografiskt granskad

Open Access i DiVA

fulltext(1053 kB)798 nedladdningar
Filinformation
Filnamn FULLTEXT01.pdfFilstorlek 1053 kBChecksumma SHA-512
43e03fc6e59a693df483d8357c25377d7efb4a7cb59d82808ce6f7c5cd81ae6959b8c3d29142089e8f4724ac691c62fc207eee828f186c772b2e07c7fd7ca254
Typ fulltextMimetyp application/pdf

Sök vidare i DiVA

Av författaren/redaktören
Afzal, Zeeshan
Av organisationen
Institutionen för matematik och datavetenskap (from 2013)
Elektroteknik och elektronik

Sök vidare utanför DiVA

GoogleGoogle Scholar
Totalt: 798 nedladdningar
Antalet nedladdningar är summan av nedladdningar för alla fulltexter. Det kan inkludera t.ex tidigare versioner som nu inte längre är tillgängliga.

isbn
urn-nbn

Altmetricpoäng

isbn
urn-nbn
Totalt: 1566 träffar
RefereraExporteraLänk till posten
Permanent länk

Direktlänk
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annat format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annat språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf