Abstract
Intrusions are becoming more complicated with the recent development of adversarial techniques. To boost the detection accuracy of a separate intrusion detector, the collaborative intrusion detection network (CIDN) has thus been developed by allowing intrusion detection system (IDS) nodes to exchange data with each other. Insider attacks are a great threat for such types of collaborative networks, where an attacker has the authorized access within the network. In literature, a challenge-based trust mechanism is effective at identifying malicious nodes by sending challenges. However, such mechanisms are heavily dependent on two assumptions, which would cause CIDNs to be vulnerable to advanced insider attacks in practice. In this work, we investigate the influence of advanced on-off attacks on challenge-based CIDNs, which can respond truthfully to one IDS node but behave maliciously to another IDS node. To evaluate the attack performance, we have conducted two experiments under a simulated and a real CIDN environment. The obtained results demonstrate that our designed attack is able to compromise the robustness of challenge-based CIDNs in practice; that is, some malicious nodes can behave untruthfully without a timely detection. Copyright © 2018 by the authors.
Original language | English |
---|---|
Article number | 6 |
Journal | Future Internet |
Volume | 10 |
Issue number | 1 |
DOIs | |
Publication status | Published - Jan 2018 |
Citation
Li, W., Meng, W., & Kwok, L. F. (2018). Investigating the influence of special on-off attacks on challenge-based collaborative intrusion detection networks. Future Internet, 10(1), Article 6. https://doi.org/10.3390/fi10010006Keywords
- Intrusion detection
- Collaborative network
- On–off attack
- Challenge-based mechanism
- Trust computation and management