Trust Management and Admission Control for Host-Based Collaborative Intrusion Detection

被引:0
|
作者
Carol Fung
Jie Zhang
Issam Aib
Raouf Boutaba
机构
[1] University of Waterloo,David R. Cheriton School of Computer Science
[2] Nanyang Technological University,School of Computer Engineering
关键词
Security; Intrusion detection systems; Acquaintance management; Collaboration networks; Peer-to-peer networks; Insider attack; Robustness;
D O I
暂无
中图分类号
学科分类号
摘要
The accuracy of detecting an intrusion within a network of intrusion detection systems (IDSes) depends on the efficiency of collaboration between member IDSes. The security itself within this network is an additional concern that needs to be addressed. In this paper, we present a trust-based framework for secure and effective collaboration within an intrusion detection network (IDN). In particular, we design a trust model that allows each IDS to evaluate the trustworthiness of other IDSes based on its personal experience. We also propose an admission control algorithm for the IDS to manage the acquaintances it approaches for advice about intrusions. We discuss the effectiveness of our approach in protecting the IDN against common attacks. Additionally, experimental results demonstrate that our system yields significant improvement in detecting intrusions. The trust model further improves the robustness of the collaborative system against malicious attacks. The experimental results also support that our admission control algorithm is effective and fair, and creates incentives for collaboration.
引用
收藏
页码:257 / 277
页数:20
相关论文
共 50 条
  • [31] Enhancing the accuracy of network-based intrusion detection with host-based context
    Dreger, H
    Kreibich, C
    Paxson, V
    Sommer, R
    DETECTION OF INTRUSIONS AND MALWARE, AND VULNERABILITY ASSESSMENT, PROCEEDINGS, 2005, 3548 : 206 - 221
  • [32] Towards a better similarity algorithm for host-based intrusion detection system
    Ouarda, Lounis
    Malika, Bourenane
    Brahim, Bouderah
    JOURNAL OF INTELLIGENT SYSTEMS, 2023, 32 (01)
  • [33] Host-based intrusion detection using dynamic and static behavioral models
    Yeung, DY
    Ding, YX
    PATTERN RECOGNITION, 2003, 36 (01) : 229 - 243
  • [34] Host-based intrusion detection with multi-datasource and deep learning
    Hwang, Ren-Hung
    Lee, Chieh-Lun
    Lin, Ying-Dar
    Lin, Po-Chin
    Wu, Hsiao-Kuang
    Lai, Yuan-Cheng
    Chen, C. K.
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 78
  • [35] On effective sampling techniques in host-based intrusion detection in tactical MANET
    Yu, Wei
    Ge, Linqiang
    Zhang, Difan
    Hardy, Rommie L.
    Reschly, Robert J.
    International Journal of Security and Networks, 2013, 8 (03) : 154 - 168
  • [36] A Unified Host-based Intrusion Detection Framework using Spark in Cloud
    Liu, Ming
    Xue, Zhi
    He, Xiangjian
    2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 97 - 103
  • [37] Bluebox: A policy-driven, host-based intrusion detection system
    Chari, Suresh N.
    Cheng, Pau-Chen
    ACM Transactions on Information and System Security, 2003, 6 (02) : 173 - 200
  • [38] A network audit system for host-based intrusion detection (NASHID) in linux
    Daniels, TE
    Spafford, EH
    16TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2000, : 178 - 187
  • [39] An Autonomous Host-Based Intrusion Detection System for Android Mobile Devices
    José Ribeiro
    Firooz B. Saghezchi
    Georgios Mantas
    Jonathan Rodriguez
    Simon J. Shepherd
    Raed A. Abd-Alhameed
    Mobile Networks and Applications, 2020, 25 : 164 - 172
  • [40] An Autonomous Host-Based Intrusion Detection System for Android Mobile Devices
    Ribeiro, Jose
    Saghezchi, Firooz B.
    Mantas, Georgios
    Rodriguez, Jonathan
    Shepherd, Simon J.
    Abd-Alhameed, Raed A.
    MOBILE NETWORKS & APPLICATIONS, 2020, 25 (01): : 164 - 172