7 research outputs found

    D2Gen: A Decentralized Device Genome Based Integrity Verification Mechanism for Collaborative Intrusion Detection Systems

    Full text link
    Collaborative Intrusion Detection Systems are considered an effective defense mechanism for large, intricate, and multilayered Industrial Internet of Things against many cyberattacks. However, while a Collaborative Intrusion Detection System successfully detects and prevents various attacks, it is possible that an inside attacker performs a malicious act and compromises an Intrusion Detection System node. A compromised node can inflict considerable damage on the whole collaborative network. For instance, when a malicious node gives a false alert of an attack, the other nodes will unnecessarily increase their security and close all of their services, thus, degrading the system's performance. On the contrary, if the spurious node approves malicious traffic into the system, the other nodes would also be compromised. Therefore, to detect a compromised node in the network, this article introduces a device integrity check mechanism based on 'Digital Genome.' In medical science, a genome refers to a set that contains all of the information needed to build and maintain an organism. Based on the same concept, the digital genome is computed over a device's vital hardware, software, and other components. Hence, if an attacker makes any change in a node's hardware and software components, the digital genome will change, and the compromised node will be easily detected. It is envisaged that the proposed integrity attestation protocol can be used in diverse Internet of Things and other information technology applications to ensure the legitimate operation of end devices. This study also proffers a comprehensive security and performance analysis of the proposed framework

    Cloning and expression of native streptokinase in E. coli BL21(DE3)

    No full text
    Streptokinase (SK) is a potent plasminogen activator naturally produced by beta-hemolytic streptococcus bacteria. Streptokinase is one of the most important thrombolytic agents that was frequently employed treatment of myocardial infarction. In this study, we amplified the SK gene isolated from Streptococcus pyogenes. The sequence of SK was recorded in the NCBI database. The Accession number of the SK sequence was   LC625519.1.  The SK gene was digested by EcoR1 and Hindlll, ligated with the linear pGEM®-3Zf (+) vector, and then introduced into an expression host E. coli BL21(DE3).  For the production of the SK protein, we induced by 1mM IPTG. SDS-PAGE was used for the evaluation of the streptokinase synthesis with a molecular weight of around 47 kDa. Using the casein lysis method and the in vitro clot lysis assay, the activity of native SK was assessed. The native SK has clot lysis activity and a clear zone in the casein plate

    Blockchain-based Secure CIDS Operation

    Full text link
    For large, intricate, and multi-layered networks like that of Industrial IoT, an individual instance of intrusion detection system cannot efficiently work against advanced attack strategies. The reason is that it would not be aware of the overall context, environment, and relevant incidents in other networks. This necessitates a collaborative intrusion detection system that allows multiple intrusion detection systems to communicate with each other and share information on emerging cyber-attack incidents. Thus, immunizing themselves and preventing the attack from escalating. However, the main challenge here is to manage the trust among the peers, where an insider attacker may input false attack signatures to the network, thus degrading the performance. Hence, we propose a blockchain-based trustfree collaborative intrusion detection system, in which threat alert messages will only be propagated in the network after network consensus

    Blockchain-based Secure CIDS Operation

    Get PDF
    For large, intricate, and multi-layered networks like that of Industrial IoT, an individual instance of intrusion detection system cannot efficiently work against advanced attack strategies. The reason is that it would not be aware of the overall context, environment, and relevant incidents in other networks. This necessitates a collaborative intrusion detection system that allows multiple intrusion detection systems to communicate with each other and share information on emerging cyber-attack incidents. Thus, immunizing themselves and preventing the attack from escalating. However, the main challenge here is to manage the trust among the peers, where an insider attacker may input false attack signatures to the network, thus degrading the performance. Hence, we propose a blockchain-based trustfree collaborative intrusion detection system, in which threat alert messages will only be propagated in the network after network consensus

    Blockchain-based Secure CIDS Operation

    No full text
    For large, intricate, and multi-layered networks like that of Industrial IoT, an individual instance of intrusion detection system cannot efficiently work against advanced attack strategies. The reason is that it would not be aware of the overall context, environment, and relevant incidents in other networks. This necessitates a collaborative intrusion detection system that allows multiple intrusion detection systems to communicate with each other and share information on emerging cyber-attack incidents. Thus, immunizing themselves and preventing the attack from escalating. However, the main challenge here is to manage the trust among the peers, where an insider attacker may input false attack signatures to the network, thus degrading the performance. Hence, we propose a blockchain-based trustfree collaborative intrusion detection system, in which threat alert messages will only be propagated in the network after network consensus
    corecore