Collaborative Distributed Intrusion Detection System

被引:0
|
作者
Lin, Wei [1 ,2 ]
Xiang, Liu [3 ]
Pao, Derek [2 ]
Liu, Bin [1 ]
机构
[1] Tsinghua Univ, Dept Comp Sci & Technol, Beijing 100084, Peoples R China
[2] City Univ Hong Kong, Dept Elect Engn, Hong Kong, Hong Kong, Peoples R China
[3] Tsinghua Univ, Dept Elect Engn, Beijing, Peoples R China
基金
高等学校博士学科点专项科研基金;
关键词
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
In order to protect Internet users from various attacks such as worms, viruses and other intrusions, signature-based intrusion detection system (IDS) should be deployed at the critical part of the network with rapid response for updating newly emerged attack signatures and containing the spread of worms or viruses at their early stage. The processing speed of one IDS cannot achieve the throughput requirement in the core networks because of the pattern matching, the key operation for signature-based IDS, is complex and time consuming. In this paper, it argues that if the signature set is shared by multiple IDSs, a packet needs to be checked once and once only by one of the IDSs, so traffic load can be redistributed among the IDSs to avoid local congestion. Packet marking is used to indicate the status of this packet utilized by collaborative IDSs, and a redistribution strategy named inner logical ring (ILR) is built among IDSs to redistribute the traffic load. Meanwhile, caching scheme is used to keep sequence for packets belonging to the same flow. This collaborative distributed IDS is robust with rapid response to various attacks, and the detection throughput is significantly increased from the throughput of the weakest IDS to the summation of all the collaborative IDSs.
引用
下载
收藏
页码:170 / +
页数:2
相关论文
共 50 条
  • [21] Wireless intrusion protection system using distributed collaborative intelligence
    Sinha, Amit
    Haddad, Issarn
    Nightingale, Todd
    Rushing, Richard
    Thomas, David
    2006 IEEE INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE, VOLS 1 AND 2, 2006, : 593 - +
  • [22] Hybrid architecture for distributed intrusion detection system
    Khonde S.R.
    Venugopal U.
    Ingenierie des Systemes d'Information, 2019, 24 (01): : 19 - 28
  • [23] An Efficient Architecture for Distributed Intrusion Detection System
    Hakimi, Zahra
    Faez, Karim
    Barati, Morteza
    2013 10TH INTERNATIONAL ISC CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2013,
  • [24] Distributed intrusion detection system based on ARTIS
    Qiao, PL
    Su, J
    Sun, CW
    Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, 2005, 5812 : 356 - 363
  • [25] Distributed intrusion detection system for sensor networks
    Panja, Biswajit
    Rashad, Sherif
    INNOVATIONS AND ADVANCED TECHNIQUES IN COMPUTER AND INFORMATION SCIENCES AND ENGINEERING, 2007, : 117 - 122
  • [26] Intelligent Agents for Distributed Intrusion Detection System
    Benattou, M.
    Tamine, K.
    PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 6, 2005, : 190 - 193
  • [27] DISTRIBUTED INTRUSION DETECTION SYSTEM FOR SCADA PROTOCOLS
    Fovino, Igor Nai
    Masera, Marcelo
    Guglielmi, Michele
    Carcano, Andrea
    Trombetta, Alberto
    CRITICAL INFRASTRUCTURE PROTECTION IV, 2010, 342 : 95 - +
  • [28] An adaptive model of a distributed intrusion detection system
    Platonov V.V.
    Semenov P.O.
    Automatic Control and Computer Sciences, 2017, 51 (8) : 894 - 898
  • [29] A Distributed Intrusion Detection System Based on Agents
    Liu, Jianxiao
    Li, Lijuan
    PACIIA: 2008 PACIFIC-ASIA WORKSHOP ON COMPUTATIONAL INTELLIGENCE AND INDUSTRIAL APPLICATION, VOLS 1-3, PROCEEDINGS, 2008, : 531 - 535
  • [30] Distributed Micro-intrusion detection system
    Liu, K.
    Han, Z.
    Jin, H.
    Lu, Y.
    Huazhong Ligong Daxue Xuebao/Journal Huazhong (Central China) University of Science and Technology, 2001, 29 (11): : 45 - 47