Collaborative Distributed Intrusion Detection System

被引:0
|
作者
Lin, Wei [1 ,2 ]
Xiang, Liu [3 ]
Pao, Derek [2 ]
Liu, Bin [1 ]
机构
[1] Tsinghua Univ, Dept Comp Sci & Technol, Beijing 100084, Peoples R China
[2] City Univ Hong Kong, Dept Elect Engn, Hong Kong, Hong Kong, Peoples R China
[3] Tsinghua Univ, Dept Elect Engn, Beijing, Peoples R China
基金
高等学校博士学科点专项科研基金;
关键词
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
In order to protect Internet users from various attacks such as worms, viruses and other intrusions, signature-based intrusion detection system (IDS) should be deployed at the critical part of the network with rapid response for updating newly emerged attack signatures and containing the spread of worms or viruses at their early stage. The processing speed of one IDS cannot achieve the throughput requirement in the core networks because of the pattern matching, the key operation for signature-based IDS, is complex and time consuming. In this paper, it argues that if the signature set is shared by multiple IDSs, a packet needs to be checked once and once only by one of the IDSs, so traffic load can be redistributed among the IDSs to avoid local congestion. Packet marking is used to indicate the status of this packet utilized by collaborative IDSs, and a redistribution strategy named inner logical ring (ILR) is built among IDSs to redistribute the traffic load. Meanwhile, caching scheme is used to keep sequence for packets belonging to the same flow. This collaborative distributed IDS is robust with rapid response to various attacks, and the detection throughput is significantly increased from the throughput of the weakest IDS to the summation of all the collaborative IDSs.
引用
下载
收藏
页码:170 / +
页数:2
相关论文
共 50 条
  • [1] Distributed and collaborative intrusion detection systems
    Farroukh, Amer
    Mukadam, Nabil
    Bassil, Elie
    Elhajj, Imad H.
    2008 IEEE LEBANON COMMUNICATIONS WORKSHOP, 2008, : 41 - 45
  • [2] Collaborative intrusion detection system
    Miller, P
    Inoue, A
    NAFIPS'2003: 22ND INTERNATIONAL CONFERENCE OF THE NORTH AMERICAN FUZZY INFORMATION PROCESSING SOCIETY - NAFIPS PROCEEDINGS, 2003, : 519 - 524
  • [3] The case for collaborative distributed wireless intrusion detection systems
    Beyah, Raheem A.
    Corbett, Cherita L.
    Copeland, John A.
    2006 IEEE INTERNATIONAL CONFERENCE ON GRANULAR COMPUTING, 2006, : 782 - +
  • [4] Collaborative Intrusion Detection Method for Marine Distributed Network
    Li, Xin
    JOURNAL OF COASTAL RESEARCH, 2018, : 57 - 61
  • [5] A Distributed Sequential Algorithm for Collaborative Intrusion Detection Networks
    Zhu, Quanyan
    Fung, Carol J.
    Boutaba, Raouf
    Basar, Tamer
    2010 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS - ICC 2010, 2010,
  • [6] Distributed collaborative intrusion detection system for vehicular Ad Hoc networks based on invariant
    Zhou, Man
    Han, Lansheng
    Lu, Hongwei
    Fu, Cai
    COMPUTER NETWORKS, 2020, 172
  • [7] Research on distributed intrusion detection system
    Wang, Zeng-Quan
    Wang, Hui-Qiang
    Zhao, Qian
    Zhang, Rui-Jie
    PROCEEDINGS OF 2006 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2006, : 181 - +
  • [8] Distributed Firewall with Intrusion Detection System
    Xie, Linquan
    Yu, Fei
    Xu, Chen
    JOURNAL OF COMPUTERS, 2012, 7 (12) : 3110 - 3115
  • [9] MODEL OF DISTRIBUTED INTRUSION DETECTION SYSTEM
    Trifonov, Vencisalv
    INTERNATIONAL JOURNAL ON INFORMATION TECHNOLOGIES AND SECURITY, 2010, 2 (02): : 67 - 72
  • [10] A distributed intrusion detection system for AODV
    Trang, Cao Minh
    Kong, Hyung-Yun
    Lee, Hong-Hee
    2006 ASIA-PACIFIC CONFERENCE ON COMMUNICATION, VOLS 1 AND 2, 2006, : 115 - +