FR3086090B1 - Methode de traitement confidentiel de logs d'un systeme d'information - Google Patents

Methode de traitement confidentiel de logs d'un systeme d'information Download PDF

Info

Publication number
FR3086090B1
FR3086090B1 FR1858359A FR1858359A FR3086090B1 FR 3086090 B1 FR3086090 B1 FR 3086090B1 FR 1858359 A FR1858359 A FR 1858359A FR 1858359 A FR1858359 A FR 1858359A FR 3086090 B1 FR3086090 B1 FR 3086090B1
Authority
FR
France
Prior art keywords
logs
system log
encrypted
information system
homomorphic
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
FR1858359A
Other languages
English (en)
Other versions
FR3086090A1 (fr
Inventor
Aymen Boudguiga
Oana Stan
Renaud Sirdey
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Commissariat a lEnergie Atomique et aux Energies Alternatives CEA
Original Assignee
Commissariat a lEnergie Atomique CEA
Commissariat a lEnergie Atomique et aux Energies Alternatives CEA
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Commissariat a lEnergie Atomique CEA, Commissariat a lEnergie Atomique et aux Energies Alternatives CEA filed Critical Commissariat a lEnergie Atomique CEA
Priority to FR1858359A priority Critical patent/FR3086090B1/fr
Priority to PCT/FR2019/052152 priority patent/WO2020058619A1/fr
Priority to US17/276,725 priority patent/US20220038478A1/en
Priority to EP19790648.0A priority patent/EP3854021A1/fr
Publication of FR3086090A1 publication Critical patent/FR3086090A1/fr
Application granted granted Critical
Publication of FR3086090B1 publication Critical patent/FR3086090B1/fr
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/008Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols involving homomorphic encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/065Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3242Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/46Secure multiparty computation, e.g. millionaire problem

Abstract

La présente invention concerne une méthode de traitement de journaux système d'un système d'information. Un générateur de journaux (LG) système transmet ces journaux système à un analyseur de journaux système (SIEM) après les avoir chiffrés au moyen d'une clé de chiffrement symétrique et lui envoie parallèlement la clé symétrique chiffrée par une clé publique de cryptosystème homomorphe. L'analyseur de journaux système effectue un transchiffrement de ces journaux puis un traitement de ceux-ci dans le domaine homomorphe. Le résultat du traitement dans le domaine homomorphe est alors transmis à un centre de sécurité (SOC) ou bien directement au générateur de journaux système pour y être déchiffré. Le centre de sécurité peut établir un rapport de sécurité ou proposer une contremesure avant de l'envoyer, sous forme chiffrée par la clé symétrique, au générateur de journaux système.
FR1858359A 2018-09-17 2018-09-17 Methode de traitement confidentiel de logs d'un systeme d'information Active FR3086090B1 (fr)

Priority Applications (4)

Application Number Priority Date Filing Date Title
FR1858359A FR3086090B1 (fr) 2018-09-17 2018-09-17 Methode de traitement confidentiel de logs d'un systeme d'information
PCT/FR2019/052152 WO2020058619A1 (fr) 2018-09-17 2019-09-16 Méthode de traitement confidentiel de logs d'un système d'information
US17/276,725 US20220038478A1 (en) 2018-09-17 2019-09-16 Confidential method for processing logs of a computer system
EP19790648.0A EP3854021A1 (fr) 2018-09-17 2019-09-16 Méthode de traitement confidentiel de logs d'un système d'information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
FR1858359A FR3086090B1 (fr) 2018-09-17 2018-09-17 Methode de traitement confidentiel de logs d'un systeme d'information

Publications (2)

Publication Number Publication Date
FR3086090A1 FR3086090A1 (fr) 2020-03-20
FR3086090B1 true FR3086090B1 (fr) 2022-01-14

Family

ID=65494276

Family Applications (1)

Application Number Title Priority Date Filing Date
FR1858359A Active FR3086090B1 (fr) 2018-09-17 2018-09-17 Methode de traitement confidentiel de logs d'un systeme d'information

Country Status (4)

Country Link
US (1) US20220038478A1 (fr)
EP (1) EP3854021A1 (fr)
FR (1) FR3086090B1 (fr)
WO (1) WO2020058619A1 (fr)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113922976A (zh) * 2020-09-15 2022-01-11 京东科技控股股份有限公司 设备日志传输方法、装置、电子设备及存储介质
WO2022058903A1 (fr) 2020-09-16 2022-03-24 Dpendent - Drone Independent System Sàrl Station logistique pour drones
WO2023121521A1 (fr) * 2021-12-20 2023-06-29 Telefonaktiebolaget Lm Ericsson (Publ) Procédés et dispositifs de prise en charge de détection d'anomalie

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013153628A1 (fr) * 2012-04-11 2013-10-17 株式会社日立製作所 Système de traitement de calcul et procédé d'authentification de résultat de calcul
US9306738B2 (en) * 2012-12-21 2016-04-05 Microsoft Technology Licensing, Llc Managed secure computations on encrypted data
FR3057122B1 (fr) * 2016-10-03 2019-08-16 Orange Procede et dispositif de detection d'intrusions sur un reseau utilisant un algorithme de chiffrement homomorphe
FR3060165B1 (fr) * 2016-12-09 2019-05-24 Commissariat A L'energie Atomique Et Aux Energies Alternatives Methode de classification securisee utilisant une operation de transchiffrement
US10728018B2 (en) * 2017-01-20 2020-07-28 Enveil, Inc. Secure probabilistic analytics using homomorphic encryption
EP3883177B1 (fr) * 2017-05-30 2022-07-27 BE-Invest International SA Procédé de protection de données générales pour le partage et la mémorisation multicentriques de données sensibles
US10498749B2 (en) * 2017-09-11 2019-12-03 GM Global Technology Operations LLC Systems and methods for in-vehicle network intrusion detection
US11087223B2 (en) * 2018-07-11 2021-08-10 International Business Machines Corporation Learning and inferring insights from encrypted data

Also Published As

Publication number Publication date
FR3086090A1 (fr) 2020-03-20
US20220038478A1 (en) 2022-02-03
EP3854021A1 (fr) 2021-07-28
WO2020058619A1 (fr) 2020-03-26

Similar Documents

Publication Publication Date Title
FR3086090B1 (fr) Methode de traitement confidentiel de logs d'un systeme d'information
CN106301763B (zh) 一种基于二重盐值的数据加密与解密方法及系统
JP5866460B2 (ja) ファイルをパックする/アンパックするための方法および装置
US20210012682A1 (en) Method and apparatus for encrypting data, method and apparatus for decrypting data
US10680805B2 (en) Data encryption control using multiple controlling authorities
ATE546944T1 (de) Verfahren und vorrichtung zur kommunikation von maschine zu maschine
US11075759B2 (en) Fingerprint data processing method and processing apparatus
CN103401678A (zh) 一种保障物联网数据传输安全的方法
HUP0201358A2 (hu) Eljárás szimmetrikus kulcs kezelésére kommunikációs hálózatban, kommunikációs hálózathoz csatlakoztatható kommunikációs eszköz és adatfeldolgozó eszköz kommunikációs hálózathoz
CN109583218B (zh) 机密文件保护、定位方法、装置、设备及可读存储介质
ATE426298T1 (de) Verfahren zur datenubermittlung zwischen einem lokalem server und lokalen klienten
CN110348181A (zh) 一种校验软件使用权合法性的方法
CN104009842A (zh) 基于des、rsa加密算法及脆弱数字水印的通信数据加解密方法
US10142306B1 (en) Methods for providing a secure network channel and devices thereof
GB2604190A (en) Methods for aggregating credit across interactions
CN110611681A (zh) 一种加密方法及装置、存储介质
CN114172645A (zh) 通信旁路审计方法、装置、电子设备及存储介质
GB201305600D0 (en) Security
CN110516451B (zh) 基于区块链的派生定密文件密级变更、解密提醒通知方法
RU2017130840A (ru) Системы и способы управления доступом к защищенным данным
KR20150140227A (ko) 데이터 오염 추적을 위한 장치 및 방법
CN111147487A (zh) 一种安全的海上数据传输方法
KR20190005540A (ko) 동형 암호화된 데이터의 연산의 위변조를 판단하는 방법
KR20180082450A (ko) 암호화된 디지털 컨텐츠의 워터마킹 방법, 워터마크된 컨텐츠로부터 고유한 식별자를 검색하기 위한 방법 및 장치, 및 컨텐츠 배포 네트워크
CN113676462B (zh) 一种密钥分发、解密方法、装置、设备及介质

Legal Events

Date Code Title Description
PLFP Fee payment

Year of fee payment: 2

PLSC Publication of the preliminary search report

Effective date: 20200320

PLFP Fee payment

Year of fee payment: 3

PLFP Fee payment

Year of fee payment: 4

PLFP Fee payment

Year of fee payment: 5

PLFP Fee payment

Year of fee payment: 6