Collaborative Distributed Intrusion Detection System

被引:0
|
作者
Lin, Wei [1 ,2 ]
Xiang, Liu [3 ]
Pao, Derek [2 ]
Liu, Bin [1 ]
机构
[1] Tsinghua Univ, Dept Comp Sci & Technol, Beijing 100084, Peoples R China
[2] City Univ Hong Kong, Dept Elect Engn, Hong Kong, Hong Kong, Peoples R China
[3] Tsinghua Univ, Dept Elect Engn, Beijing, Peoples R China
基金
高等学校博士学科点专项科研基金;
关键词
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
In order to protect Internet users from various attacks such as worms, viruses and other intrusions, signature-based intrusion detection system (IDS) should be deployed at the critical part of the network with rapid response for updating newly emerged attack signatures and containing the spread of worms or viruses at their early stage. The processing speed of one IDS cannot achieve the throughput requirement in the core networks because of the pattern matching, the key operation for signature-based IDS, is complex and time consuming. In this paper, it argues that if the signature set is shared by multiple IDSs, a packet needs to be checked once and once only by one of the IDSs, so traffic load can be redistributed among the IDSs to avoid local congestion. Packet marking is used to indicate the status of this packet utilized by collaborative IDSs, and a redistribution strategy named inner logical ring (ILR) is built among IDSs to redistribute the traffic load. Meanwhile, caching scheme is used to keep sequence for packets belonging to the same flow. This collaborative distributed IDS is robust with rapid response to various attacks, and the detection throughput is significantly increased from the throughput of the weakest IDS to the summation of all the collaborative IDSs.
引用
收藏
页码:170 / +
页数:2
相关论文
共 50 条
  • [41] Distributed model of intrusion detection system based on agent
    Ma, Heng-Tai
    Jiang, Jian-Chun
    Chen, Wei-Feng
    Qing, Si-Han
    Ruan Jian Xue Bao/Journal of Software, 2000, 11 (10): : 1312 - 1319
  • [42] Distributed intrusion detection system based on fuzzy rules
    Qiao, Peili
    Su, Jie
    Liu, Yahui
    DATA MINING, INTRUSION DETECTION, INFORMATION ASSURANCE, AND DATA NETWORKS SECURITY 2006, 2006, 6241
  • [43] A safe mobile agent system for distributed intrusion detection
    Zhong, SC
    Song, QF
    Cheng, XC
    Zhang, Y
    2003 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-5, PROCEEDINGS, 2003, : 2009 - 2014
  • [44] A study on the distributed communication model of intrusion Detection System
    Park, SY
    Park, SG
    HCI '05: Proceedings of the 2005 International Conference on Human-Computer Interaction, 2005, : 24 - 29
  • [45] A Distributed Intrusion Detection System for Industrial Automation Networks
    Schuster, Franka
    Paul, Andreas
    2012 IEEE 17TH CONFERENCE ON EMERGING TECHNOLOGIES & FACTORY AUTOMATION (ETFA), 2012,
  • [46] A Distributed Intrusion Detection System Based on Mobile Agents
    Mo Xiu-liang
    Wang Chun-dong
    Wang Huai-bin
    PROCEEDINGS OF THE 2009 2ND INTERNATIONAL CONFERENCE ON BIOMEDICAL ENGINEERING AND INFORMATICS, VOLS 1-4, 2009, : 2110 - 2114
  • [47] A distributed intrusion detection model for the domain name system
    Chen, Chang-Sheng
    Tseng, Shian-Shyong
    Liu, Chien-Liang
    2002, Institute of Information Science (18)
  • [48] Distributed Intrusion Detection System using Mobile Agents
    Trivedi, Bhushan
    Rajput, Jayant
    Dwivedi, Chintan
    Jobanputra, Pinky
    COMPUTING, COMMUNICATION, AND CONTROL, 2011, 1 : 57 - 61
  • [49] Distributed intrusion detection system based on Windows registry
    Zhang, Xue-Qin
    Lin, Jia-Jun
    Huadong Ligong Daxue Xuebao /Journal of East China University of Science and Technology, 2004, 30 (06): : 677 - 681
  • [50] Distributed Intrusion Detection System for Wireless Sensor Networks
    Medhat, Karen
    Ramadan, Rabie A.
    Talkhan, Ihab
    2015 9TH INTERNATIONAL CONFERENCE ON NEXT GENERATION MOBILE APPLICATIONS, SERVICES AND TECHNOLOGIES (NGMAST 2015), 2015, : 234 - 239