network data after it has been decrypted, and outgoing
traffic before it will be encrypted. TLSS is capable to
forward gathered data to available local (or remote)
detection engines. A main benefit is that TLSS nei-
ther harms non-repudiation assurances nor does it re-
quire export of private keys from the monitored host.
Furthermore, we discuss the practicability of TLSS.
In a proof-of-concept implementation, we prove evi-
dence that a standard detection engine in combination
with TLSS is able to detect attacks encapsulated in
encrypted SSL data. In addition, we give a detailed
analysis of TLSS’s performance.
This paper is structured as follows: In Section 2, we
review related works and introduce, elaborate and de-
tail our Transport Layer Security Sensor in Section 3.
Afterwards, we describe in Section 4 the proof-of-
concept, and summarize and discuss the measured
performance results in Section 5. Finally, we con-
clude our work with a summary of our major results
and outlook on future work in Section 6.
2 RELATED WORKS
Ristic (Ristic, 2005) introduces an approach to defend
Web servers from malicious data inside encrypted
SSL connections. He proposes the integration of an
IDS inside the Web server software as loadable mod-
ule. The basic idea is to hook in the unencrypted
web server application’s internal information flow. He
presents a module for the Apache httpd Web server
consisting of a proprietary intrusion detection and
prevention engine as proof-of-concept. The idea is a
straightforward solution for standalone Web servers
but prevents integration into existing IDS used to
monitor several servers or entire networks. Further,
the idea is limited to open source or extendable server
software.
Almgren and Lindqvist (Almgren and Lindqvist,
2001) introduce an application-integrated approach to
collect data aimed at a server. The authors propose
the use of corresponding APIs to hook in the server
application, and to take control of data flows inside
the application. Gathered data is sent to a detection
engine. Further, data flows can be suspended until the
detection engine evaluates data, though providing pre-
vention functionality. In addition, the authors provide
an implementation for a web server. The basic idea
is similar to the one proposed in (Ristic, 2005) but
provides cooperation with existing detection engines.
Still, the solution is limited to open source server soft-
ware or software that enables external modules to take
over process control. In addition, there is a high de-
velopment effort, as every monitored application re-
quires a special sensor.
3 TRANSPORT LAYER
SECURITY SENSOR (TLSS)
The efficiency of Intrusion Detection Systems highly
depends upon the data they analyze, hence encrypted
data poses a serious threat. We propose a new sensor,
providing detection engines access to data encapsu-
lated in encrypted tunnels. In this context, sensor in-
dicates a data capturing software tool installed on the
monitored host, gathering network packets’ headers
and payload.
3.1 Rationale
Transport Layer Security Protocols, (e.g. SSL, Se-
cure Shell (SSH)), are a favored technique to secure
transported data on public networks. Those protocols
encrypt Application Layer headers and payload, but
do not change headers of protocols on the Internet-
or Transport Layer, (e.g., IP and TCP). Cryptographic
functions for Transport Layer Security Protocols are
generally implemented by an application and not the
OS. For instance, common web servers and browsers
include cryptographic functions for SSL connections
and do not rely on the OS to offer these capabili-
ties. The OS passes incoming encrypted data to the
corresponding application which decrypts and pro-
cesses it. Hence, capturing local data flows between
OS and application, e.g. with a HIDS sensor, results
in encrypted Application Layer headers and appli-
cation payload, valueless for common detection en-
gines. Hooking up applications and analyzing unen-
crypted internal data flows is costly and not feasible
for closed source software. Therefore, we propose to
outsource the cryptographic functions from the appli-
cation to a software security module, residing on the
same host as the application, and to capture the un-
encrypted local traffic between this module and the
application. Transport Layer Security Sensor (TLSS)
integrates both a module providing security functions
and a data capturing sensor.
3.2 Design of TLSS
TLSS consists of two parts, the Local Application
Proxy (LAP) performing cryptographic functions and
a software sensor to capture data. The basic idea of
TLSS is to outsource cryptographic functions from
the application to LAP, thus, enabling the software
sensor to capture unencrypted data exchanged be-
tween LAP and application. Incoming encrypted net-
work packets aimed at the application first pass the
network stack implemented by the OS. Subsequently,
the OS hands the packets to LAP which decrypts and
forwards them to the application. On the other hand,
the application passes outgoing packets to the LAP
SECURITY SENSOR PROVIDING ANALYSIS OF ENCRYPTED NETWORK DATA
173