Abstract
To enhance the detection capability of a single intrusion detection system (IDS), collaborative intrusion detection networks (CIDNs) have been exploited and developed via enabling a set of IDS nodes to exchange information with each other. In CIDNs, challenge-based trust mechanism has been considered as one promising solution to identify malicious nodes by evaluating the satisfaction levels between challenges and responses. However, such mechanism is still vulnerable to some advanced insider attacks like passive message fingerprint attack (PMFA), which is deemed as an advanced attack on challenge-based CIDNs by collecting messages and identifying normal requests in a passive way. In this work, we focus on PMFA and design Honey Challenge, an improved challenge mechanism for challenge-based CIDNs characterized by sending challenges in a similar way of sending normal requests, in such a way malicious nodes cannot accurately identify the normal requests. In the evaluation, we investigate the attack performance under both simulated and real network environments. Experimental results demonstrate that our proposed mechanism can identify malicious nodes under PMFA and decrease their trust values in a quick manner. Copyright © 2018 IEEE.
Original language | English |
---|---|
Title of host publication | Proceedings of 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018 |
Place of Publication | USA |
Publisher | IEEE |
Pages | 1208-1213 |
ISBN (Print) | 9781538643877 |
DOIs | |
Publication status | Published - Sept 2018 |
Citation
Li, W., Meng, W., Wang, Y., Kwok, L. F., & Lu, R. (2018). Identifying passive message fingerprint attacks via honey challenge in collaborative intrusion detection networks. In Proceedings of 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018 (pp. 1208-1213). IEEE. https://doi.org/10.1109/TrustCom/BigDataSE.2018.00167Keywords
- Intrusion detection
- Collaborative environment
- Insider threat
- Passive message fingerprint attack
- Challenge-based mechanism
- Trust computation