Middleboxes in a computer network system inspect and analyse network traffic to detect malicious communications, monitor system performance and provide operational services. However, encrypted traffic hinders the ability of middleboxes to perform such services. A common practice in addressing this issue is by employing a "Man-in-the-Middle" (MitM) approach, wherein an encrypted traffic flow between two endpoints is interrupted, decrypted and analysed by the middleboxes. The MitM approach is straightforward and is used by many organisations, but there are both practical and privacy concerns. Due to the cost of the MitM appliances and the latency incurred in the encrypt-decrypt processes, enterprises continue to seek solutions that are less costly. There were discussion on the many efforts required to configure MitM. Besides, MitM violates end-to-end privacy guarantee, raising privacy concerns and issues on compliance especially with the rising awareness on user privacy. Furthermore, some of the MitM implementations were found to be flawed. Consequently, new practical and privacy-preserving techniques for inspection over encrypted traffic were proposed. We examine them to compare their advantages, limitations and challenges. We categorise them into four main categories by defining a framework that consist of system architectures, use cases, trust and threat models. These are searchable encryption, access control, machine learning and trusted hardware. We first discuss the man-in-the-middle approach as a baseline, then discuss in details each of them, and provide an in-depth comparisons of their advantages and limitations. By doing so we describe practical constraints, advantages and pitfalls towards adopting the techniques. We also give insights on the gaps between research work and industrial deployment, which leads us to the discussion on the challenges and research directions.
翻译:计算机网络系统中的中继箱检查和分析网络流量,以发现恶意通信,监测系统性能并提供操作服务。然而,加密通信阻碍中端箱进行此类服务的能力。解决这一问题的一个常见做法是采用“中继器”(MitM)方法,在两个端点之间进行加密通信流动,中断、解密并用中间箱进行分析。MTM方法直截了当,许多组织都使用该方法,但也存在深度和隐私问题。由于MTM设备的成本和加密解密过程中产生的延迟,企业继续寻找成本较低的解决方案。此外,MTM违反端对端的隐私保障(MitM)方法,在两个端点之间进行加密,引起隐私问题,特别是用户隐私意识的提高。此外,MTM的一些实施发现存在缺陷。因此,我们提出了对加密交通检查的新的实际和隐私差异的比较技术。我们检查了这些设备的成本,以比较其优点、局限性和挑战为代价较低。关于配置MitMTMM的多种努力,此外,MitM违反了端研究保证,我们用这些工具来进行搜索,我们用这些工具来解释。我们用这些工具来解释这些工具的搜索和变值框架。