Trust Management and Admission Control for Host-Based Collaborative Intrusion Detection

被引:0
|
作者
Carol Fung
Jie Zhang
Issam Aib
Raouf Boutaba
机构
[1] University of Waterloo,David R. Cheriton School of Computer Science
[2] Nanyang Technological University,School of Computer Engineering
关键词
Security; Intrusion detection systems; Acquaintance management; Collaboration networks; Peer-to-peer networks; Insider attack; Robustness;
D O I
暂无
中图分类号
学科分类号
摘要
The accuracy of detecting an intrusion within a network of intrusion detection systems (IDSes) depends on the efficiency of collaboration between member IDSes. The security itself within this network is an additional concern that needs to be addressed. In this paper, we present a trust-based framework for secure and effective collaboration within an intrusion detection network (IDN). In particular, we design a trust model that allows each IDS to evaluate the trustworthiness of other IDSes based on its personal experience. We also propose an admission control algorithm for the IDS to manage the acquaintances it approaches for advice about intrusions. We discuss the effectiveness of our approach in protecting the IDN against common attacks. Additionally, experimental results demonstrate that our system yields significant improvement in detecting intrusions. The trust model further improves the robustness of the collaborative system against malicious attacks. The experimental results also support that our admission control algorithm is effective and fair, and creates incentives for collaboration.
引用
收藏
页码:257 / 277
页数:20
相关论文
共 50 条
  • [41] Generating Host-Based Data from Network Traces for Intrusion Detection
    Day, Patrick
    Iannucci, Stefano
    Banicescu, Ioana
    2023 IEEE 47TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE, COMPSAC, 2023, : 268 - 273
  • [42] Applying host-based intrusion detection to critical communication infrastructure components
    Bowen, TF
    7TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL V, PROCEEDINGS: COMPUTER SCIENCE AND ENGINEERING: I, 2003, : 452 - 457
  • [43] Multivariate statistical analysis of audit trails for host-based intrusion detection
    Ye, N
    Emran, SM
    Chen, Q
    Vilbert, S
    IEEE TRANSACTIONS ON COMPUTERS, 2002, 51 (07) : 810 - 820
  • [44] Enhancing Security of Host-Based Intrusion Detection Systems for the Internet of Things
    Nallakaruppan, M. K.
    Somayaji, Siva Rama Krishnan
    Fuladi, Siddhesh
    Benedetto, Francesco
    Ulaganathan, Senthil Kumaran
    Yenduri, Gokul
    IEEE ACCESS, 2024, 12 : 31788 - 31797
  • [45] On effective data aggregation techniques in host-based intrusion detection in MANET
    Zhang, Difan
    Ge, Linqiang
    Yu, Wei
    Zhang, Hanlin
    Hardy, Rommie L.
    Reschly, Robert J.
    International Journal of Security and Networks, 2013, 8 (04) : 179 - 193
  • [46] Multi-level host-based intrusion detection system for Internet of things
    Robin Gassais
    Naser Ezzati-Jivan
    Jose M. Fernandez
    Daniel Aloise
    Michel R. Dagenais
    Journal of Cloud Computing, 9
  • [47] Host-based intrusion detection system for secure human-centric computing
    Daesung Moon
    Sung Bum Pan
    Ikkyun Kim
    The Journal of Supercomputing, 2016, 72 : 2520 - 2536
  • [48] Motif-oriented representation of sequences for a host-based intrusion detection system
    Tandon, G
    Mitra, D
    Chan, PK
    INNOVATIONS IN APPLIED ARTIFICIAL INTELLIGENCE, 2004, 3029 : 605 - 615
  • [49] Anomaly Generation Using Generative Adversarial Networks in Host-Based Intrusion Detection
    Salem, Milad
    Taheri, Shayan
    Yuan, Jiann Shiun
    2018 9TH IEEE ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), 2018, : 683 - 687
  • [50] Host-based intrusion detection system for secure human-centric computing
    Moon, Daesung
    Pan, Sung Bum
    Kim, Ikkyun
    JOURNAL OF SUPERCOMPUTING, 2016, 72 (07): : 2520 - 2536