{"id":63,"date":"2022-02-22T15:59:45","date_gmt":"2022-02-22T20:59:45","guid":{"rendered":"https:\/\/carleton.ca\/sci-lab\/?p=63"},"modified":"2022-03-29T13:16:35","modified_gmt":"2022-03-29T17:16:35","slug":"paper-accepted-oblivious-intrusion-detection-system","status":"publish","type":"post","link":"https:\/\/carleton.ca\/sci-lab\/2022\/paper-accepted-oblivious-intrusion-detection-system\/","title":{"rendered":"Paper Accepted &#8216;Oblivious Intrusion Detection System&#8217;"},"content":{"rendered":"<p>Our recent paper, Mahmoud A. Sayed and Mostafa Taha `Oblivious Intrusion Detection System,&#8217; was accepted in the IEEE International Symposium on Hardware Oriented Security and Trust \u2013 HOST 2022 (Acceptance rate 25\\%, Peer-reviewed), Washington DC, USA, 2022.<\/p>\n<p>Intrusion Detection Systems (IDSs) are capable of monitoring network traffic and matching it against rules. Oblivious IDSs perform the same tasks of IDSs while using encrypted rules and producing encrypted results without being able to decrypt the rules or the results. Current implementations to this technology suffer from slow searching speeds and\/or lack of generality. In this paper we present a generic approach to implement privacy-preserving intrusion detection system based on hybrid binary gates along with an application algorithm for hybrid text matching. Benchmarking showed a wide variety of trade-offs with minimum searching time of 897 msecs for 1-byte encrypted rule through 10-bytes plaintext.<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter wp-image-64 size-full\" src=\"https:\/\/carleton.ca\/sci-lab\/wp-content\/uploads\/OIDS-Paper.png\" alt=\"\" width=\"1027\" height=\"286\" srcset=\"https:\/\/carleton.ca\/sci-lab\/wp-content\/uploads\/OIDS-Paper.png 1027w, https:\/\/carleton.ca\/sci-lab\/wp-content\/uploads\/OIDS-Paper-240x67.png 240w, https:\/\/carleton.ca\/sci-lab\/wp-content\/uploads\/OIDS-Paper-400x111.png 400w, https:\/\/carleton.ca\/sci-lab\/wp-content\/uploads\/OIDS-Paper-160x45.png 160w, https:\/\/carleton.ca\/sci-lab\/wp-content\/uploads\/OIDS-Paper-768x214.png 768w, https:\/\/carleton.ca\/sci-lab\/wp-content\/uploads\/OIDS-Paper-360x100.png 360w\" sizes=\"(max-width: 1027px) 100vw, 1027px\" \/><\/p>\n<p>Congratulations to Mahmoud Sayed<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Our recent paper, Mahmoud A. Sayed and Mostafa Taha `Oblivious Intrusion Detection System,&#8217; was accepted in the IEEE International Symposium on Hardware Oriented Security and Trust \u2013 HOST 2022 (Acceptance rate 25\\%, Peer-reviewed), Washington DC, USA, 2022. Intrusion Detection Systems (IDSs) are capable of monitoring network traffic and matching it against rules. Oblivious IDSs perform [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","_mi_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[22],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Paper Accepted &#039;Oblivious Intrusion Detection System&#039; - Secure Cryptographic Implementations Lab<\/title>\n<meta name=\"description\" content=\"Our recent paper, Mahmoud A. Sayed and Mostafa Taha `Oblivious Intrusion Detection System,&#039; was accepted in the IEEE International Symposium on Hardware\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/carleton.ca\/sci-lab\/2022\/paper-accepted-oblivious-intrusion-detection-system\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"mostafataha\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/carleton.ca\/sci-lab\/2022\/paper-accepted-oblivious-intrusion-detection-system\/\",\"url\":\"https:\/\/carleton.ca\/sci-lab\/2022\/paper-accepted-oblivious-intrusion-detection-system\/\",\"name\":\"Paper Accepted 'Oblivious Intrusion Detection System' - Secure Cryptographic Implementations Lab\",\"isPartOf\":{\"@id\":\"https:\/\/carleton.ca\/sci-lab\/#website\"},\"datePublished\":\"2022-02-22T20:59:45+00:00\",\"dateModified\":\"2022-03-29T17:16:35+00:00\",\"author\":{\"@id\":\"https:\/\/carleton.ca\/sci-lab\/#\/schema\/person\/593240383ec693f0aacc15bbf787a2d2\"},\"description\":\"Our recent paper, Mahmoud A. Sayed and Mostafa Taha `Oblivious Intrusion Detection System,' was accepted in the IEEE International Symposium on Hardware\",\"breadcrumb\":{\"@id\":\"https:\/\/carleton.ca\/sci-lab\/2022\/paper-accepted-oblivious-intrusion-detection-system\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/carleton.ca\/sci-lab\/2022\/paper-accepted-oblivious-intrusion-detection-system\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/carleton.ca\/sci-lab\/2022\/paper-accepted-oblivious-intrusion-detection-system\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/carleton.ca\/sci-lab\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"News\",\"item\":\"https:\/\/carleton.ca\/sci-lab\/category\/news\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Paper Accepted &#8216;Oblivious Intrusion Detection System&#8217;\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/carleton.ca\/sci-lab\/#website\",\"url\":\"https:\/\/carleton.ca\/sci-lab\/\",\"name\":\"Secure Cryptographic Implementations Lab\",\"description\":\"Carleton University\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/carleton.ca\/sci-lab\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/carleton.ca\/sci-lab\/#\/schema\/person\/593240383ec693f0aacc15bbf787a2d2\",\"name\":\"mostafataha\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/carleton.ca\/sci-lab\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/bc4541f1b17d18c6c59a4bfe68488b73?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/bc4541f1b17d18c6c59a4bfe68488b73?s=96&d=mm&r=g\",\"caption\":\"mostafataha\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Paper Accepted 'Oblivious Intrusion Detection System' - Secure Cryptographic Implementations Lab","description":"Our recent paper, Mahmoud A. Sayed and Mostafa Taha `Oblivious Intrusion Detection System,' was accepted in the IEEE International Symposium on Hardware","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/carleton.ca\/sci-lab\/2022\/paper-accepted-oblivious-intrusion-detection-system\/","twitter_misc":{"Written by":"mostafataha","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/carleton.ca\/sci-lab\/2022\/paper-accepted-oblivious-intrusion-detection-system\/","url":"https:\/\/carleton.ca\/sci-lab\/2022\/paper-accepted-oblivious-intrusion-detection-system\/","name":"Paper Accepted 'Oblivious Intrusion Detection System' - Secure Cryptographic Implementations Lab","isPartOf":{"@id":"https:\/\/carleton.ca\/sci-lab\/#website"},"datePublished":"2022-02-22T20:59:45+00:00","dateModified":"2022-03-29T17:16:35+00:00","author":{"@id":"https:\/\/carleton.ca\/sci-lab\/#\/schema\/person\/593240383ec693f0aacc15bbf787a2d2"},"description":"Our recent paper, Mahmoud A. Sayed and Mostafa Taha `Oblivious Intrusion Detection System,' was accepted in the IEEE International Symposium on Hardware","breadcrumb":{"@id":"https:\/\/carleton.ca\/sci-lab\/2022\/paper-accepted-oblivious-intrusion-detection-system\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/carleton.ca\/sci-lab\/2022\/paper-accepted-oblivious-intrusion-detection-system\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/carleton.ca\/sci-lab\/2022\/paper-accepted-oblivious-intrusion-detection-system\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/carleton.ca\/sci-lab\/"},{"@type":"ListItem","position":2,"name":"News","item":"https:\/\/carleton.ca\/sci-lab\/category\/news\/"},{"@type":"ListItem","position":3,"name":"Paper Accepted &#8216;Oblivious Intrusion Detection System&#8217;"}]},{"@type":"WebSite","@id":"https:\/\/carleton.ca\/sci-lab\/#website","url":"https:\/\/carleton.ca\/sci-lab\/","name":"Secure Cryptographic Implementations Lab","description":"Carleton University","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/carleton.ca\/sci-lab\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/carleton.ca\/sci-lab\/#\/schema\/person\/593240383ec693f0aacc15bbf787a2d2","name":"mostafataha","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/carleton.ca\/sci-lab\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/bc4541f1b17d18c6c59a4bfe68488b73?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/bc4541f1b17d18c6c59a4bfe68488b73?s=96&d=mm&r=g","caption":"mostafataha"}}]}},"acf":{"Post Thumbnail Icon":"event-lecture","Post Thumbnail":false},"_links":{"self":[{"href":"https:\/\/carleton.ca\/sci-lab\/wp-json\/wp\/v2\/posts\/63"}],"collection":[{"href":"https:\/\/carleton.ca\/sci-lab\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/carleton.ca\/sci-lab\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/carleton.ca\/sci-lab\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/carleton.ca\/sci-lab\/wp-json\/wp\/v2\/comments?post=63"}],"version-history":[{"count":2,"href":"https:\/\/carleton.ca\/sci-lab\/wp-json\/wp\/v2\/posts\/63\/revisions"}],"predecessor-version":[{"id":66,"href":"https:\/\/carleton.ca\/sci-lab\/wp-json\/wp\/v2\/posts\/63\/revisions\/66"}],"wp:attachment":[{"href":"https:\/\/carleton.ca\/sci-lab\/wp-json\/wp\/v2\/media?parent=63"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/carleton.ca\/sci-lab\/wp-json\/wp\/v2\/categories?post=63"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/carleton.ca\/sci-lab\/wp-json\/wp\/v2\/tags?post=63"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}