777 research outputs found
Design and Management of Collaborative Intrusion Detection Networks
In recent years network intrusions have become a severe threat to the privacy and safety of computer users. Recent cyber attacks compromise a large number of hosts to form botnets. Hackers not only aim at harvesting private data and identity information from compromised nodes, but also use the compromised nodes to launch attacks such as distributed denial-of-service (DDoS) attacks.
As a counter measure, Intrusion Detection Systems (IDS) are used to identify intrusions by comparing observable behavior against suspicious patterns.
Traditional IDSs monitor computer activities on a single host or network traffic in a sub-network. They do not have a global view of intrusions and are not effective in detecting fast spreading attacks, unknown, or new threats. In turn, they can achieve better detection accuracy through collaboration. An Intrusion Detection Network (IDN) is such a collaboration network allowing IDSs to exchange information with each other and to benefit from the collective knowledge and experience shared by others. IDNs enhance the overall accuracy of intrusion assessment as well as the ability to detect new intrusion types.
Building an effective IDN is however a challenging task. For example, adversaries may compromise some IDSs in the network and then leverage the compromised nodes to send false information, or even attack others in the network, which can compromise the efficiency of the IDN. It is, therefore, important for an IDN to detect and isolate malicious insiders. Another challenge is how to make efficient intrusion detection assessment based on the collective diagnosis from other IDSs. Appropriate selection of collaborators and incentive-compatible resource management in support of IDSs' interaction with others are also key challenges in IDN design.
To achieve efficiency, robustness, and scalability, we propose an IDN architecture and especially focus on the design of four of its essential components, namely, trust management, acquaintance management, resource management, and feedback aggregation. We evaluate our proposals and compare them with prominent ones in the literature and show their superiority using several metrics, including efficiency, robustness, scalability, incentive-compatibility, and fairness. Our IDN design provides guidelines for the deployment of a secure and scalable IDN where effective collaboration can be established between IDSs
Design and evaluation of advanced collusion attacks on collaborative intrusion detection networks in practice
Joint 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 10th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Symposium on Parallel and Distributed Processing with Applications, IEEE TrustCom/BigDataSE/ISPA 2016, Tianjin, China, 23-26 August 2016To encourage collaboration among single intrusion detection systems (IDSs), collaborative intrusion detection networks (CIDNs) have been developed that enable different IDS nodes to communicate information with each other. This distributed network infrastructure aims to improve the detection performance of a single IDS, but may suffer from various insider attacks like collusion attacks, where several malicious nodes can collaborate to perform adversary actions. To defend against insider threats, challenge-based trust mechanisms have been proposed in the literature and proven to be robust against collusion attacks. However, we identify that such mechanisms depend heavily on an assumption of malicious nodes, which is not likely to be realistic and may lead to a weak threat model in practical scenarios. In this paper, we analyze the robustness of challenge-based CIDNs in real-world applications and present an advanced collusion attack, called random poisoning attack, which derives from the existing attacks. In the evaluation, we investigate the attack performance in both simulated and real CIDN environments. Experimental results demonstrate that our attack can enables a malicious node to send untruthful information without decreasing its trust value at large. Our research attempts to stimulate more research in designing more robust CIDN framework in practice.Department of Computing2016-2017 > Academic research: refereed > Refereed conference paperbcw
On Collaborative Intrusion Detection
Cyber-attacks have nowadays become more frightening than ever before. The growing dependency of our society on networked systems aggravates these threats; from interconnected
corporate networks and Industrial Control Systems (ICSs) to smart households, the attack surface for the adversaries is increasing. At the same time, it is becoming evident that the utilization of classic fields of security research alone, e.g., cryptography, or the usage of
isolated traditional defense mechanisms, e.g., firewalls and Intrusion
Detection Systems ( IDSs ), is not enough to cope with the imminent
security challenges.
To move beyond monolithic approaches and concepts that follow a
“cat and mouse” paradigm between the defender and the attacker,
cyber-security research requires novel schemes. One such promis-
ing approach is collaborative intrusion detection. Driven by the lessons learned from cyber-security research over the years, the aforesaid notion attempts to connect two instinctive questions: “if we acknowledge the fact that no security mechanism can detect all attacks, can we
beneficially combine multiple approaches to operate together?” and
“as the adversaries increasingly collaborate (e.g., Distributed Denial
of Service (DDoS) attacks from whichever larger botnets) to achieve
their goals, can the defenders beneficially collude too?”. Collabora-
tive intrusion detection attempts to address the emerging security
challenges by providing methods for IDSs and other security mech-
anisms (e.g., firewalls and honeypots) to combine their knowledge
towards generating a more holistic view of the monitored network.
This thesis improves the state of the art in collaborative intrusion
detection in several areas. In particular, the dissertation proposes
methods for the detection of complex attacks and the generation of
the corresponding intrusion detection signatures. Moreover, a novel
approach for the generation of alert datasets is given, which can assist
researchers in evaluating intrusion detection algorithms and systems.
Furthermore, a method for the construction of communities of collab-
orative monitoring sensors is given, along with a domain-awareness
approach that incorporates an efficient data correlation mechanism.
With regard to attacks and countermeasures, a detailed methodology
is presented that is focusing on sensor-disclosure attacks in the con-
text of collaborative intrusion detection.
The scientific contributions can be structured into
the following categories:
Alert data generation: This thesis deals with the topic of alert
data generation in a twofold manner: first it presents novel approaches
for detecting complex attacks towards generating alert signatures for
IDSs ; second a method for the synthetic generation of alert data is pro-
posed. In particular, a novel security mechanism for mobile devices
is proposed that is able to support users in assessing the security
status of their networks. The system can detect sophisticated attacks
and generate signatures to be utilized by IDSs . The dissertation also
touches the topic of synthetic, yet realistic, dataset generation for the
evaluation of intrusion detection algorithms and systems; it proposes
a novel dynamic dataset generation concept that overcomes the short-
comings of the related work.
Collaborative intrusion detection: As a first step, the the-
sis proposes a novel taxonomy for collaborative intrusion detection ac-
companied with building blocks for Collaborative IDSs ( CIDSs ). More-
over, the dissertation deals with the topics of (alert) data correlation
and aggregation in the context of CIDSs . For this, a number of novel
methods are proposed that aim at improving the clustering of mon-
itoring sensors that exhibit similar traffic patterns. Furthermore, a
novel alert correlation approach is presented that can minimize the
messaging overhead of a CIDS.
Attacks on CIDSs: It is common for research on cyber-defense to
switch its perspective, taking on the viewpoint of attackers, trying to
anticipate their remedies against novel defense approaches. The the-
sis follows such an approach by focusing on a certain class of attacks
on CIDSs that aim at identifying the network location of the monitor-
ing sensors. In particular, the state of the art is advanced by proposing
a novel scheme for the improvement of such attacks. Furthermore, the
dissertation proposes novel mitigation techniques to overcome both
the state of art and the proposed improved attacks.
Evaluation: All the proposals and methods introduced in the dis-
sertation were evaluated qualitatively, quantitatively and empirically.
A comprehensive study of the state of the art in collaborative intru-
sion detection was conducted via a qualitative approach, identifying
research gaps and surveying the related work. To study the effective-
ness of the proposed algorithms and systems extensive simulations
were utilized. Moreover, the applicability and usability of some of
the contributions in the area of alert data generation was additionally
supported via Proof of Concepts (PoCs) and prototypes.
The majority of the contributions were published in peer-reviewed
journal articles, in book chapters, and in the proceedings of interna-
tional conferences and workshops
- …