Improving SIEM capabilities through an enhanced probe for encrypted Skype traffic detection

11/01/2017
by   Mario Di Mauro, et al.
0

Nowadays, the Security Information and Event Management (SIEM) systems take on great relevance in handling security issues for critical infrastructures as Internet Service Providers. Basically, a SIEM has two main functions: i) the collection and the aggregation of log data and security information from disparate network devices (routers, firewalls, intrusion detection systems, ad hoc probes and others) and ii) the analysis of the gathered data by implementing a set of correlation rules aimed at detecting potential suspicious events as the presence of encrypted real-time traffic. In the present work, the authors propose an enhanced implementation of a SIEM where a particular focus is given to the detection of encrypted Skype traffic by using an ad-hoc developed enhanced probe (ESkyPRO) conveniently governed by the SIEM itself. Such enhanced probe, able to interact with an agent counterpart deployed into the SIEM platform, is designed by exploiting some machine learning concepts. The main purpose of the proposed ad-hoc SIEM is to correlate the information received by ESkyPRO and other types of data obtained by an Intrusion Detection System (IDS) probe in order to make the encrypted Skype traffic detection as accurate as possible.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
06/08/2023

Intrusion Detection Systems for Flying Ad-hoc Networks

Unmanned Aerial Vehicles (UAVs) are becoming more dependent on mission s...
research
07/17/2022

RSU-Based Online Intrusion Detection and Mitigation for VANET

Secure vehicular communication is a critical factor for secure traffic m...
research
03/14/2023

An Intrusion Detection Mechanism for MANETs Based on Deep Learning Artificial Neural Networks (ANNs)

Mobile Ad-hoc Network (MANET) is a distributed, decentralized network of...
research
03/19/2019

Spline Based Intrusion Detection in Vehicular Ad Hoc Networks (VANET)

Intrusion detection systems (IDSs) play a crucial role in the identifica...
research
03/19/2019

Trends on Computer Security: Cryptography, User Authentication, Denial of Service and Intrusion Detection

The new generation of security threats has been promoted by digital curr...
research
04/20/2021

Passive, Transparent, and Selective TLS Decryption for Network Security Monitoring

Internet traffic is increasingly encrypted. While this protects the conf...
research
11/21/2017

Intrusion Detection and Ubiquitous Host to Host Encryption

Growing concern for individual privacy, driven by an increased public aw...

Please sign up or login with your details

Forgot password? Click here to reset