Enhancing challenge-based collaborative intrusion detection networks against insider attacks using blockchain

被引:34
作者
Meng, Weizhi [1 ]
Li, Wenjuan [2 ]
Yang, Laurence T. [3 ]
Li, Peng [4 ]
机构
[1] Syst Univ Denmark, DTU Compute, Anker Engelunds Vej 1, Lyngby, Denmark
[2] City Univ Hong Kong, Dept Comp Sci, Tat Chee Ave, Hong Kong, Peoples R China
[3] Francis Xavier Univ, Dept Comp Sci, St, Antigonish, NS B2G 2W5, Canada
[4] Dalian Univ Technol, Sch Software Technol, Dalian, Liaoning Provin, Peoples R China
关键词
Challenge-based mechanism; Collaborative intrusion detection; Blockchain technology; Insider attack; Trust management; MANAGEMENT; IOT;
D O I
10.1007/s10207-019-00462-x
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the rapid growth of computer networks, intrusions have become more complicated and devastating. As an important solution, collaborative intrusion detection networks or systems (CIDNs or CIDSs) are considered and adopted by many organizations to identify cyberattacks. Insider attack is one major threat to such defensive mechanisms. In the literature, challenge-based trust management scheme can help safeguard CIDNs against insider attacks. However, previous studies identified that challenge-based CIDNs may still suffer from advanced insider attacks, like passive message fingerprint attack (PMFA). Motivated by the recent blockchain research, in this work, we propose a blockchain-based approach to help enhance the robustness of challenge-based CIDNs against advanced insider attacks like PMFA, through integrating a type of blockchain-based trust. In the evaluation, we examine our approach in both simulated and real network environments. The results demonstrate that our approach is effective in defeating advanced insider attacks like PMFA and enhancing the robustness of challenge-based CIDNs, as compared with the original scheme.
引用
收藏
页码:279 / 290
页数:12
相关论文
共 40 条
[1]  
Abdelghani W, 2018, INT C RISKS SEC INT, P48, DOI DOI 10.1007/978-3-030-12143-3_5
[2]  
[Anonymous], 2018, IOT INN REP
[3]  
[Anonymous], 2017, INT C CRIT INF INFR
[4]  
[Anonymous], FUTURE GENERATION CO
[5]  
[Anonymous], P ESORICS
[6]  
[Anonymous], INT J DISTRIB SENS N
[7]  
[Anonymous], 2017, P 2 INT C INT THINGS
[8]  
[Anonymous], J INF SECUR APPL
[9]   A Critical Review of Practices and Challenges in Intrusion Detection Systems for IoT: Toward Universal and Resilient Systems [J].
Benkhelifa, Elhadj ;
Welsh, Thomas ;
Hamouda, Walaa .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2018, 20 (04) :3496-3509
[10]   A trust-aware, P2P-based overlay for intrusion detection [J].
Duma, Claudiu ;
Karresand, Martin ;
Shahmehri, Nahid ;
Caronni, Germano .
SEVENTEENTH INTERNATIONAL CONFERENCE ON DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 2006, :692-+