Trust Management and Admission Control for Host-Based Collaborative Intrusion Detection

被引:0
|
作者
Carol Fung
Jie Zhang
Issam Aib
Raouf Boutaba
机构
[1] University of Waterloo,David R. Cheriton School of Computer Science
[2] Nanyang Technological University,School of Computer Engineering
关键词
Security; Intrusion detection systems; Acquaintance management; Collaboration networks; Peer-to-peer networks; Insider attack; Robustness;
D O I
暂无
中图分类号
学科分类号
摘要
The accuracy of detecting an intrusion within a network of intrusion detection systems (IDSes) depends on the efficiency of collaboration between member IDSes. The security itself within this network is an additional concern that needs to be addressed. In this paper, we present a trust-based framework for secure and effective collaboration within an intrusion detection network (IDN). In particular, we design a trust model that allows each IDS to evaluate the trustworthiness of other IDSes based on its personal experience. We also propose an admission control algorithm for the IDS to manage the acquaintances it approaches for advice about intrusions. We discuss the effectiveness of our approach in protecting the IDN against common attacks. Additionally, experimental results demonstrate that our system yields significant improvement in detecting intrusions. The trust model further improves the robustness of the collaborative system against malicious attacks. The experimental results also support that our admission control algorithm is effective and fair, and creates incentives for collaboration.
引用
收藏
页码:257 / 277
页数:20
相关论文
共 50 条
  • [21] Host-based intrusion detection system using optimal representation
    Jung, YS
    Choi, YJ
    Park, N
    Kim, WN
    Hong, MP
    7TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL XIII, PROCEEDINGS: SYSTEMICS, CYBERNETICS AND INFORMATICS: TECHNOLOGIES AND APPLICATIONS, 2003, : 143 - 147
  • [22] On Effective Sampling Techniques for Host-based Intrusion Detection in MANET
    Ge, Linqiang
    Zhang, Difan
    Hardy, Rommie
    Liu, Hui
    Yu, Wei
    Reschly, Robert
    2012 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2012), 2012,
  • [23] Host-Based Intrusion Detection Model Using Siamese Network
    Park, Daekyeong
    Kim, Sangsoo
    Kwon, Hyukjin
    Shin, Dongil
    Shin, Dongkyoo
    IEEE ACCESS, 2021, 9 : 76614 - 76623
  • [24] Host-based intrusion detection by monitoring windows registry accesses
    Topallar, M
    Depren, MÖ
    Anarim, E
    Ciliz, K
    PROCEEDINGS OF THE IEEE 12TH SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE, 2004, : 728 - 731
  • [25] Host-based intrusion detection based on real time keystroke sequences
    Gao, Yan
    Guan, Xiao-Hong
    Sun, Guo-Ji
    Feng, Li
    Jisuanji Xuebao/Chinese Journal of Computers, 2004, 27 (03): : 396 - 401
  • [26] Application of Sequence Embedding in Host-based Intrusion Detection System
    Lu, Yijun
    Teng, Shaohua
    PROCEEDINGS OF THE 2021 IEEE 24TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN (CSCWD), 2021, : 434 - 439
  • [27] Robust and Scalable Trust Management for Collaborative Intrusion Detection
    Fung, Carol J.
    Zhang, Jie
    Aib, Issam
    Boutaba, Raouf
    2009 IFIP/IEEE INTERNATIONAL SYMPOSIUM ON INTEGRATED NETWORK MANAGEMENT (IM 2009) VOLS 1 AND 2, 2009, : 33 - 40
  • [28] On Effective Data Aggregation Techniques In Host-based Intrusion Detection in MANET
    Zhang, Difan
    Ge, Linqiang
    Hardy, Rommie
    Yu, Wei
    Zhang, Hanlin
    Reschly, Robert
    2013 IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE (CCNC), 2013, : 85 - 90
  • [29] Host-Based Intrusion Detection for VANETs: A Statistical Approach to Rogue Node Detection
    Zaidi, Kamran
    Milojevic, Milos B.
    Rakocevic, Veselin
    Nallanathan, Arumugam
    Rajarajan, Muttukrishnan
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2016, 65 (08) : 6703 - 6714
  • [30] Host-based intrusion detection using self-organizing maps
    Lichodzijewski, P
    Zincir-Heywood, AN
    Heywood, MI
    PROCEEDING OF THE 2002 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS, VOLS 1-3, 2002, : 1714 - 1719