Secured Cyber-Attack Signatures Distribution using Blockchain Technology

被引:9
作者
Ajayi, Oluwaseyi [1 ]
Cherian, Melvin [1 ]
Saadawi, Tarek [1 ]
机构
[1] CUNY City Coll, Dept Elect Engn, New York, NY 10031 USA
来源
2019 22ND IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (IEEE CSE 2019) AND 17TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (IEEE EUC 2019) | 2019年
关键词
cooperative intrusion detection; cyberattack; signature; blockchain; latency;
D O I
10.1109/CSE/EUC.2019.00095
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The proliferation of cloud database has increased its vulnerability to cyberattacks. Despite several proposed methods of securing databases, malicious intruders find ways to exploit their vulnerabilities and gain access to data. This is because cyberattacks are becoming more sophisticated and harder to detect. As a result, it is becoming very difficult for a single or isolated intrusion detection system (IDS) node to detect all attacks. With the adoption of cooperative intrusion detection system, all attacks can be detected by an IDS node with the help of other IDS nodes. In cooperative intrusion detection, IDS nodes exchange attack signatures with the view of promptly detecting any attack that has been detected by other IDS. Therefore, the security of the database that houses these shared attack signatures becomes a huge problem. More specifically, detecting and/or preventing malicious signature injection, manipulation or deletion becomes important. This paper proposed an architecture that securely stores and distribute these attack signatures in real time for the purpose of prompt detection. Our proposed architecture leverages the distributed ledger technology, data immutability and tamper-proof abilities of blockchain technology. The performance of our system was examined by using the latency of the blockchain network.
引用
收藏
页码:482 / 488
页数:7
相关论文
共 25 条
[1]  
Abdullah N, 2017, INT CONF UBIQ FUTUR, P887
[2]  
Ahram T, 2017, 2017 IEEE TECHNOLOGY & ENGINEERING MANAGEMENT SOCIETY CONFERENCE (TEMSCON), P137, DOI 10.1109/TEMSCON.2017.7998367
[3]  
[Anonymous], 2003, CISC VIS NETW IND GL
[4]  
Bye R., 2010, P COLLSEC US WORKSH
[5]   Knowledge and perceptions about Zika virus in a Middle East country [J].
Cheema, Sohaila ;
Maisonneuve, Patrick ;
Weber, Ingmar ;
Fernandez-Luque, Luis ;
Abraham, Amit ;
Alrouh, Hekmat ;
Sheikh, Javaid ;
Lowenfels, Albert B. ;
Mamtani, Ravinder .
BMC INFECTIOUS DISEASES, 2017, 17
[6]  
Chi-Chun Lo, 2010, 2010 39th International Conference on Parallel Processing Workshops (ICPPW), P280, DOI 10.1109/ICPPW.2010.46
[7]   A trust-aware, P2P-based overlay for intrusion detection [J].
Duma, Claudiu ;
Karresand, Martin ;
Shahmehri, Nahid ;
Caronni, Germano .
SEVENTEENTH INTERNATIONAL CONFERENCE ON DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 2006, :692-+
[8]  
Golomb T., 2018, Proceedings of the First Workshop on Decentralized IoT Security and Standards (DISS'18), San Diego, CA, USA, February 18, DOI DOI 10.14722/DISS.2018.23003
[9]   Consortium Blockchain-Based Malware Detection in Mobile Devices [J].
Gu, Jingjing ;
Sun, Binglin ;
Du, Xiaojiang ;
Wang, Jun ;
Zhuang, Yi ;
Wang, Ziwang .
IEEE ACCESS, 2018, 6 :12118-12128
[10]  
Igbe O., 2017, 2 INT C SMART CLOUD