Experiments in Encrypted and Searchable Network Audit Logs

Network telemetry in the form of NetFlow, IPFix, Syslogs and others, constitute important data about network activity. Such telemetry is considered valuable for network planning, security forensics and audits. The authors consider the scenario where a consumer can securely outsource their network telemetry data to a Cloud Service Provider (CSP) and enable a third party to audit such telemetry for any security forensics. Especially, they consider the use case of privacy preserving search in network log audits. In this paper, they experiment with advances in Identity Based Encryption (IBE) and Attribute-Based Encryption (ABE) schemes for auditing network logs.

Spotlight

PKWARE

Every day, Thieves, Snoops and Idiots exploit the gaps in enterprise information security. Breaches are costing companies too much time, money and credibility. It’s time to stop believing in solutions that focus on networks and devices. Today’s threats require us to armor the data itself, so it’s protected everywhere it is used, shared and stored. We've solved these problems through the introduction of Smartcrypt. It’s next-generation encryption and key management, simplified in a way nobody thought possible. Smartcrypt provides persistent protection and control that travels with your information. High performance, cross-platform security that is easily embedded and managed without changing the way you work. Data is our heritage. It’s in our DNA. With 28 years of experience, 30,000 customers and 200 government agencies using our products, you won’t find a more trusted name in information security. Smartcrypt is the solution for today’s cybersecurity threats.

OTHER WHITEPAPERS
news image

API Security: Best Practices for Vulnerability Mitigation

whitePaper | June 6, 2023

API Security: Best Practices for Vulnerability Mitigation provides a hands-on approach to mitigate security vulnerabilities in APIs. The paper emphasizes the importance of implementing security measures that protect the API and underlying infrastructure. The paper identifies various security vulnerabilities that can arise in APIs and provides detailed guidelines for securing them. These guidelines cover authentication, authorization, input validation, output encoding, error handling, logging, and auditing.

Read More
news image

Dashlane’s Security Principles & Architecture

whitePaper | May 16, 2023

Dashlane Business supports login with single sign-on (SSO), using any SAML 2.0 enabled IdP. In a single-sign-on setup, the user doesn’t have to input UserMP . Instead, a random key is generated at account creation. This key (the data encryption key) is delivered to the Dashlane app after the user successfully logs in to the IdP, and it is used as a symmetric encryption key to encrypt and decrypt the user data.

Read More
news image

Cyber Security After the Pandemic

whitePaper | April 29, 2021

The cyber security industry has faced two major sets of challenges over the last twelve months. The attacks and exploits affecting Solar Winds, Accellion, Microsoft and their customers have focused attention on supply chain risk, but the impact of the coronavirus pandemic has been felt more broadly across cyber security domains and disciplines.

Read More
news image

Zero Trust Maturity Model

whitePaper | April 28, 2023

The Cybersecurity and Infrastructure Security Agency (CISA) leads the nation’s effort to understand, manage, and reduce cybersecurity risk, including by supporting Federal Civilian Executive Branch agencies in evolving and operationalizing cybersecurity programs and capabilities. CISA’s Zero Trust Maturity Model (ZTMM) provides an approach to achieve continued modernization efforts related to zero trust within a rapidly evolving environment and technology landscape. This ZTMM is one of many paths that an organization can take in designing and implementing their transition plan to zero trust architectures in accordance with Executive Order (EO) 14028 “Improving the Nation’s Cybersecurity” § (3)(b)(ii),1 which requires that agencies develop a plan to implement a Zero Trust Architecture (ZTA). While the ZTMM is specifically tailored for federal agencies as required by EO 14028, all organizations should review and consider adoption of the approaches outlined in this document.

Read More
news image

AWS Best Practices for DDoS Resiliency

whitePaper | December 5, 2019

You work to protect your business from the impact of Distributed Denial of Service (DDoS) attacks, as well as other cyberattacks. You want to keep your customers’ trust in your service by maintaining the availability and responsiveness of your application. And you want to avoid unnecessary direct costs when your infrastructure must scale in response to an attack.

Read More
news image

Remote Support Security Whitepaper

whitePaper | October 21, 2022

The purpose of this document is to help technically-oriented professionals understand the security-related value BeyondTrust can bring to your organization. BeyondTrust can help your support organization stay secure and compliant, while improving the efficiency and success of your organization with a better end-user support experience.

Read More

Spotlight

PKWARE

Every day, Thieves, Snoops and Idiots exploit the gaps in enterprise information security. Breaches are costing companies too much time, money and credibility. It’s time to stop believing in solutions that focus on networks and devices. Today’s threats require us to armor the data itself, so it’s protected everywhere it is used, shared and stored. We've solved these problems through the introduction of Smartcrypt. It’s next-generation encryption and key management, simplified in a way nobody thought possible. Smartcrypt provides persistent protection and control that travels with your information. High performance, cross-platform security that is easily embedded and managed without changing the way you work. Data is our heritage. It’s in our DNA. With 28 years of experience, 30,000 customers and 200 government agencies using our products, you won’t find a more trusted name in information security. Smartcrypt is the solution for today’s cybersecurity threats.

Events