Abstract
Cyber attacks are greatly expanding in both size and complexity. To handle this issue, research has been focused on collaborative intrusion detection networks (CIDNs), which can improve the detection accuracy of a single IDS by allowing various nodes to communicate with each other. While such collaborative system or network is vulnerable to insider attacks, which can significantly reduce the advantages of a detector. To protect CIDNs against insider attacks, one potential way is to enhance the trust evaluation among IDS nodes, i.e., by emphasizing the impact of expert nodes. In this work, we adopt the notion of intrusion sensitivity that assigns different values of detection capability relating to particular attacks, and evaluate its impact on defending against a special On-Off attack (SOOA). In the evaluation, we investigate the impact of intrusion sensitivity in a simulated CIDN environment, and experimental results demonstrate that the use of intrusion sensitivity can help enhance the security of CIDNs under adversarial scenarios, like SOOA. Copyright © 2018 Springer Nature Switzerland AG.
Original language | English |
---|---|
Title of host publication | Algorithms and architectures for parallel processing: 18th International Conference, ICA3PP 2018, Guangzhou, China, November 15-17, 2018, proceedings, part IV |
Editors | Jaideep VAIDYA, Jin LI |
Place of Publication | Cham |
Publisher | Springer |
Pages | 481-494 |
ISBN (Electronic) | 9783030050634 |
ISBN (Print) | 9783030050627 |
DOIs | |
Publication status | Published - 2018 |
Citation
Madsen, D., Li, W., Meng, W., & Wang, Y. (2018). Evaluating the impact of intrusion sensitivity on securing collaborative intrusion detection networks against SOOA. In J. Vaidya & J. Li (Eds.), Algorithms and architectures for parallel processing: 18th International Conference, ICA3PP 2018, Guangzhou, China, November 15-17, 2018, proceedings, part IV (pp. 481-494). Springer. https://doi.org/10.1007/978-3-030-05063-4_36Keywords
- Intrusion detection
- Collaborative network
- Insider attack
- Intrusion sensitivity
- Challenge-based trust mechanism