Sphinx: a Colluder-Resistant Trust Mechanism for Collaborative Intrusion Detection

被引:3
|
作者
Cordero, Carlos Garcia [1 ]
Traverso, Giulia [1 ]
Nojoumian, Mehrdad [2 ]
Habib, Sheikh Mahbub [3 ]
Muehlhaeuser, Max [1 ]
Buchmann, Johannes [1 ]
Vasilomanolakis, Emmanouil [1 ]
机构
[1] Tech Univ Darmstadt, Dept Comp Sci, D-64289 Darmstadt, Germany
[2] Florida Atlantic Univ, Dept Comp & Elect Engn & Comp Sci, Boca Raton, FL 33431 USA
[3] Continental AG, D-60488 Frankfurt, Germany
来源
IEEE ACCESS | 2018年 / 6卷
基金
欧盟地平线“2020”;
关键词
Clustering; collaborative intrusion detection; machine learning; mixture models; sensor reliability; trust management;
D O I
10.1109/ACCESS.2018.2880297
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The destructive effects of cyber-attacks demand more proactive security approaches. One such promising approach is the idea of collaborative intrusion detection systems (CIDS s). These systems combine the knowledge of multiple sensors (e.g., intrusion detection systems, honeypots, or firewalls) to create a holistic picture of a monitored network. Sensors monitor parts of a network and exchange alert data to learn from each other, improve their detection capabilities and ultimately identify sophisticated attacks. Nevertheless, if one or a group of sensors is unreliable (due to incompetence or malice), the system might miss important information needed to detect attacks. In this paper, we propose Sphinx, an evidence-based trust mechanism capable of detecting unreliable sensors within a CIDS. The Sphinx detects, both, single sensors or coalitions of dishonest sensors that lie about the reliability of others to boost or worsen their trust score. Our evaluation shows that, given an honest majority of sensors, dishonesty is punished in a timely manner. Moreover, if several coalitions exist, even when more than 50% of all sensors are dishonest, dishonesty is punished.
引用
收藏
页码:72427 / 72438
页数:12
相关论文
共 50 条
  • [1] On Blockchain Architectures for Trust-based Collaborative Intrusion Detection
    Kolokotronis, Nicholas
    Brotsis, Sotirios
    Germanos, Georgios
    Vassilakis, Costas
    Shiaeles, Stavros
    2019 IEEE WORLD CONGRESS ON SERVICES (IEEE SERVICES 2019), 2019, : 21 - 28
  • [2] Trust Management for Host-Based Collaborative Intrusion Detection
    Fung, Carol J.
    Baysal, Olga
    Zhang, Jie
    Aib, Issarn
    Boutaba, Raouf
    MANAGING LARGE-SCALE SERVICE DEPLOYMENT, PROCEEDINGS, 2008, 5273 : 109 - 122
  • [3] Enhancing Trust Evaluation Using Intrusion Sensitivity in Collaborative Intrusion Detection Networks: Feasibility and Challenges
    Li, Wenjuan
    Meng, Yuxin
    Kwok, Lam-For
    2013 9TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2013, : 518 - 522
  • [4] Towards Collaborative Intrusion Detection Enhancement against Insider Attacks with Multi-Level Trust
    Li, Wenjuan
    Meng, Weizhi
    Zhu, Hui
    2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 1180 - 1187
  • [5] A Blockchain-Based Retribution Mechanism for Collaborative Intrusion Detection
    Fan, Wenjun
    Kumar, Shubham
    Chang, Sang-Yoon
    Park, Younghee
    SILICON VALLEY CYBERSECURITY CONFERENCE, SVCC 2022, 2022, 1683 : 57 - 73
  • [6] Evaluating intrusion sensitivity allocation with supervised learning in collaborative intrusion detection
    Li, Wenjuan
    Tian, Fei
    Li, Jin
    Xiang, Yang
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (16)
  • [7] Evaluating Intrusion Sensitivity Allocation with Support Vector Machine for Collaborative Intrusion Detection
    Li, Wenjuan
    Meng, Weizhi
    Kwok, Lam For
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2019, 2019, 11879 : 453 - 463
  • [8] Taxonomy and Survey of Collaborative Intrusion Detection
    Vasilomanolakis, Emmanouil
    Karuppayah, Shankar
    Muehlhaeuser, Max
    Fischer, Mathias
    ACM COMPUTING SURVEYS, 2015, 47 (04)
  • [9] Enhancing collaborative intrusion detection networks against insider attacks using supervised intrusion sensitivity-based trust management model
    Li, Wenjuan
    Meng, Weizhi
    Kwok, Lam-For
    Ip, Horace H. S.
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 77 : 135 - 145
  • [10] Surveying Trust-Based Collaborative Intrusion Detection: State-of-the-Art, Challenges and Future Directions
    Li, Wenjuan
    Meng, Weizhi
    Kwok, Lam For
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2022, 24 (01): : 280 - 305