Trust Management and Admission Control for Host-Based Collaborative Intrusion Detection

被引:0
|
作者
Carol Fung
Jie Zhang
Issam Aib
Raouf Boutaba
机构
[1] University of Waterloo,David R. Cheriton School of Computer Science
[2] Nanyang Technological University,School of Computer Engineering
关键词
Security; Intrusion detection systems; Acquaintance management; Collaboration networks; Peer-to-peer networks; Insider attack; Robustness;
D O I
暂无
中图分类号
学科分类号
摘要
The accuracy of detecting an intrusion within a network of intrusion detection systems (IDSes) depends on the efficiency of collaboration between member IDSes. The security itself within this network is an additional concern that needs to be addressed. In this paper, we present a trust-based framework for secure and effective collaboration within an intrusion detection network (IDN). In particular, we design a trust model that allows each IDS to evaluate the trustworthiness of other IDSes based on its personal experience. We also propose an admission control algorithm for the IDS to manage the acquaintances it approaches for advice about intrusions. We discuss the effectiveness of our approach in protecting the IDN against common attacks. Additionally, experimental results demonstrate that our system yields significant improvement in detecting intrusions. The trust model further improves the robustness of the collaborative system against malicious attacks. The experimental results also support that our admission control algorithm is effective and fair, and creates incentives for collaboration.
引用
收藏
页码:257 / 277
页数:20
相关论文
共 50 条
  • [1] Trust Management and Admission Control for Host-Based Collaborative Intrusion Detection
    Fung, Carol
    Zhang, Jie
    Aib, Issam
    Boutaba, Raouf
    JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2011, 19 (02) : 257 - 277
  • [2] Trust Management for Host-Based Collaborative Intrusion Detection
    Fung, Carol J.
    Baysal, Olga
    Zhang, Jie
    Aib, Issarn
    Boutaba, Raouf
    MANAGING LARGE-SCALE SERVICE DEPLOYMENT, PROCEEDINGS, 2008, 5273 : 109 - 122
  • [3] DAHID: Domain Adaptive Host-based Intrusion Detection
    Ajayi, Oluwagbemiga
    Gangopadhyay, Aryya
    PROCEEDINGS OF THE 2021 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE (IEEE CSR), 2021, : 467 - 472
  • [4] A Novel Mechanism for Host-Based Intrusion Detection System
    Harshitha, Ch Gayathri
    Rao, M. Kameswara
    Kumar, P. Neelesh
    FIRST INTERNATIONAL CONFERENCE ON SUSTAINABLE TECHNOLOGIES FOR COMPUTATIONAL INTELLIGENCE, 2020, 1045 : 527 - 536
  • [5] Methods for Host-based Intrusion Detection with Deep Learning
    Ring J.H.
    Van Oort C.M.
    Durst S.
    White V.
    Near J.P.
    Skalka C.
    Digital Threats: Research and Practice, 2021, 2 (04):
  • [6] A Behavioral Graph Model for Host-Based Intrusion Detection
    Cao, Zechun
    Huang, Shou-Hsuan Stephen
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2023, 18 (02): : 48 - 57
  • [7] The Design and Implementation of Host-based Intrusion Detection System
    Lin Ying
    Zhang Yan
    Ou Yang-Jia
    2010 THIRD INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY AND SECURITY INFORMATICS (IITSI 2010), 2010, : 595 - 598
  • [8] Development of a Host-Based Intrusion Detection and Control Device for Industrial Field Control Devices
    Rice, Theora R.
    Seppala, Garret
    Edgar, Thomas
    Choi, Eric
    Cain, Daniel
    Mahserejian, Shant
    2019 RESILIENCE WEEK (RWS), 2019, : 105 - 111
  • [9] Host-Based Intrusion Detection Using Statistical Approaches
    Gautam, Sunil Kumar
    Om, Hari
    PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON FRONTIERS IN INTELLIGENT COMPUTING: THEORY AND APPLICATIONS (FICTA) 2015, 2016, 404 : 481 - 493
  • [10] Sequence Covering for Efficient Host-Based Intrusion Detection
    Martea, Pierre-Francois
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (04) : 994 - 1006