Sphinx: a Colluder-Resistant Trust Mechanism for Collaborative Intrusion Detection

被引:3
|
作者
Cordero, Carlos Garcia [1 ]
Traverso, Giulia [1 ]
Nojoumian, Mehrdad [2 ]
Habib, Sheikh Mahbub [3 ]
Muehlhaeuser, Max [1 ]
Buchmann, Johannes [1 ]
Vasilomanolakis, Emmanouil [1 ]
机构
[1] Tech Univ Darmstadt, Dept Comp Sci, D-64289 Darmstadt, Germany
[2] Florida Atlantic Univ, Dept Comp & Elect Engn & Comp Sci, Boca Raton, FL 33431 USA
[3] Continental AG, D-60488 Frankfurt, Germany
来源
IEEE ACCESS | 2018年 / 6卷
基金
欧盟地平线“2020”;
关键词
Clustering; collaborative intrusion detection; machine learning; mixture models; sensor reliability; trust management;
D O I
10.1109/ACCESS.2018.2880297
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The destructive effects of cyber-attacks demand more proactive security approaches. One such promising approach is the idea of collaborative intrusion detection systems (CIDS s). These systems combine the knowledge of multiple sensors (e.g., intrusion detection systems, honeypots, or firewalls) to create a holistic picture of a monitored network. Sensors monitor parts of a network and exchange alert data to learn from each other, improve their detection capabilities and ultimately identify sophisticated attacks. Nevertheless, if one or a group of sensors is unreliable (due to incompetence or malice), the system might miss important information needed to detect attacks. In this paper, we propose Sphinx, an evidence-based trust mechanism capable of detecting unreliable sensors within a CIDS. The Sphinx detects, both, single sensors or coalitions of dishonest sensors that lie about the reliability of others to boost or worsen their trust score. Our evaluation shows that, given an honest majority of sensors, dishonesty is punished in a timely manner. Moreover, if several coalitions exist, even when more than 50% of all sensors are dishonest, dishonesty is punished.
引用
收藏
页码:72427 / 72438
页数:12
相关论文
共 50 条
  • [21] Trust-Based Intrusion Detection in Wireless Sensor Networks
    Bao, Fenye
    Chen, Ing-Ray
    Chang, MoonJeong
    Cho, Jin-Hee
    2011 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2011,
  • [22] A Distributed Cooperative Trust Based Intrusion Detection Framework for MANETs
    Mutlu, Sureyya
    Yilmaz, Guray
    PROCEEDINGS OF ICNS 2011: THE SEVENTH INTERNATIONAL CONFERENCE ON NETWORKING AND SERVICES, 2011, : 292 - 298
  • [23] Evaluating the Impact of Intrusion Sensitivity on Securing Collaborative Intrusion Detection Networks Against SOOA
    Madsen, David
    Li, Wenjuan
    Meng, Weizhi
    Wang, Yu
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2018, PT IV, 2018, 11337 : 481 - 494
  • [24] Challenge-based collaborative intrusion detection in software-defined networking: an evaluation
    Li, Wenjuan
    Wang, Yu
    Jin, Zhiping
    Yu, Keping
    Li, Jin
    Xiang, Yang
    DIGITAL COMMUNICATIONS AND NETWORKS, 2021, 7 (02) : 257 - 263
  • [25] A Review: Collaborative Intrusion Detection for IoT integrating the Blockchain technologies
    Benaddi, Hafsa
    Ibrahimi, Khalil
    2020 8TH INTERNATIONAL CONFERENCE ON WIRELESS NETWORKS AND MOBILE COMMUNICATIONS (WINCOM 2020), 2020, : 72 - 77
  • [26] Collaborative Intrusion Detection Approach Based on Blockchain in Internet of Vehicles
    Xing, Rui
    Su, Zhou
    Wang, Yuntao
    IEEE INTERNET OF THINGS JOURNAL, 2025, 12 (09): : 11965 - 11976
  • [28] A blockchain-based decentralized machine learning framework for collaborative intrusion detection within UAVs
    Khan, Ammar Ahmed
    Khan, Muhammad Mubashir
    Khan, Kashif Mehboob
    Arshad, Junaid
    Ahmad, Farhan
    COMPUTER NETWORKS, 2021, 196
  • [29] Blockchain and Federated Learning for Collaborative Intrusion Detection in Vehicular Edge Computing
    Liu, Hong
    Zhang, Shuaipeng
    Zhang, Pengfei
    Zhou, Xinqiang
    Shao, Xuebin
    Pu, Geguang
    Zhang, Yan
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2021, 70 (06) : 6073 - 6084
  • [30] Decentralized multi-dimensional alert correlation for collaborative intrusion detection
    Zhou, Chenfeng Vincent
    Leckie, Christopher
    Karunasekera, Shanika
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2009, 32 (05) : 1106 - 1123