Design of intrusion sensitivity-based trust management model for collaborative intrusion detection networks

Wenjuan LI, Weizhi MENG, Lam-For KWOK

Research output: Chapter in Book/Report/Conference proceedingChapters

55 Citations (Scopus)

Abstract

Network intrusions are becoming more and more sophisticated to detect. To mitigate this issue, intrusion detection systems (IDSs) have been widely deployed in identifying a variety of attacks and collaborative intrusion detection networks (CIDNs) have been proposed which enables an IDS to collect information and learn experience from other IDSs with the purpose of improving detection accuracy. A CIDN is expected to have more power in detecting attacks such as denial-of-service (DoS) than a single IDS. In real deployment, we notice that each IDS has different levels of sensitivity in detecting different types of intrusions (i.e., based on their own signatures and settings). In this paper, we propose a machine learning-based approach to assign intrusion sensitivity based on expert knowledge and design a trust management model that allows each IDS to evaluate the trustworthiness of others by considering their detection sensitivities. In the evaluation, we explore the performance of our proposed approach under different attack scenarios. The experimental results indicate that by considering the intrusion sensitivity, our trust model can enhance the detection accuracy of malicious nodes as compared to existing similar models. Copyright © 2014 IFIP International Federation for Information Processing.

Original languageEnglish
Title of host publicationTrust management VIII: 8th IFIP WG 11.11 International Conference, IFIPTM 2014, Singapore, July 7-10, 2014, proceedings
EditorsJianying ZHOU, Nurit GAL-OZ, Jie ZHANG, Ehud GUDES
Place of PublicationBerlin
PublisherSpringer
Pages61-76
ISBN (Electronic)9783662438138
ISBN (Print)9783662438121
DOIs
Publication statusPublished - 2014

Citation

Li, W., Meng, W., & Kwok, L.-F. (2014). Design of intrusion sensitivity-based trust management model for collaborative intrusion detection networks. In J. Zhou, N. Gal-Oz, J. Zhang, & E. Gudes (Eds.), Trust management VIII: 8th IFIP WG 11.11 International Conference, IFIPTM 2014, Singapore, July 7-10, 2014, proceedings (pp. 61-76). Springer. https://doi.org/10.1007/978-3-662-43813-8_5

Keywords

  • Network security
  • Intrusion detection
  • Trust management
  • Intrusion sensitivity
  • Collaborative intrusion detection network

Fingerprint

Dive into the research topics of 'Design of intrusion sensitivity-based trust management model for collaborative intrusion detection networks'. Together they form a unique fingerprint.