A Hierarchical Architecture and Probabilistic Strategy for Collaborative Intrusion Detection

被引:6
|
作者
Hardegen, Christoph [1 ]
Petersen, Mike [1 ]
Ezelu, Chukwuebuka [1 ]
Geier, Timo [1 ]
Rieger, Sebastian [1 ]
Buehler, Ulrich [1 ]
机构
[1] Fulda Univ Appl Sci, Dept Appl Comp Sci, Fulda, Germany
来源
2021 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS) | 2021年
关键词
Collaborative Intrusion Detection; Hierarchical Architecture; Probabilistic Classification Strategy; Network Flows; NETWORK; OVERLAY;
D O I
10.1109/CNS53000.2021.9705027
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Large-scale network attacks like (distributed) denial of service or probing/port scanning are performed in a (highly) distributed and coordinated manner to increase their volume and velocity. Since systems from multiple infrastructures are involved while either being used as attack source or targeted as destination, local scopes w.r.t. observed network data can be combined to extract or derive comprehensive knowledge for attack detection at a global level. To support this, a three-tier hierarchical architecture for collaborative intrusion detection and a probabilistic classification strategy for flow data that leverages the architecture for local and especially global collaboration are proposed in this paper. While the benefits of the approach depend on the considered attack type and may vary for participating networks, experiments reveal that the CIDS hierarchy is advantageous compared to other intrusion detection deployments w.r.t. achieved accuracy scores and shared data volume.
引用
收藏
页码:128 / 136
页数:9
相关论文
共 50 条
  • [1] Generative Pattern Dissemination for Collaborative Intrusion Detection
    Petersen, Mike
    Hardegen, Christoph
    Buehler, Ulrich
    2023 6TH CONFERENCE ON CLOUD AND INTERNET OF THINGS, CIOT, 2023, : 163 - 170
  • [2] Taxonomy and Survey of Collaborative Intrusion Detection
    Vasilomanolakis, Emmanouil
    Karuppayah, Shankar
    Muehlhaeuser, Max
    Fischer, Mathias
    ACM COMPUTING SURVEYS, 2015, 47 (04)
  • [3] Evaluating intrusion sensitivity allocation with supervised learning in collaborative intrusion detection
    Li, Wenjuan
    Tian, Fei
    Li, Jin
    Xiang, Yang
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (16):
  • [4] An Intrusion Detection Model With Hierarchical Attention Mechanism
    Liu, Chang
    Liu, Yang
    Yan, Yu
    Wang, Ji
    IEEE ACCESS, 2020, 8 (08) : 67542 - 67554
  • [5] Evaluating Intrusion Sensitivity Allocation with Support Vector Machine for Collaborative Intrusion Detection
    Li, Wenjuan
    Meng, Weizhi
    Kwok, Lam For
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2019, 2019, 11879 : 453 - 463
  • [6] Blockchain-based collaborative intrusion detection scheme
    Dang, Tianran
    Tian, Guohua
    Wei, Jianghong
    Liu, Shuqin
    INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING, 2023, 26 (04) : 418 - 429
  • [7] Collaborative RFID intrusion detection with an artificial immune system
    Yang, Haidong
    Guo, Jianhua
    Deng, Feiqi
    JOURNAL OF INTELLIGENT INFORMATION SYSTEMS, 2011, 36 (01) : 1 - 26
  • [8] Collaborative RFID intrusion detection with an artificial immune system
    Haidong Yang
    Jianhua Guo
    Feiqi Deng
    Journal of Intelligent Information Systems, 2011, 36 : 1 - 26
  • [9] Intelligent Architecture Based on MAS and CBR for Intrusion Detection
    El Ajjouri, Mohssine
    Benhadou, Siham
    Medromi, Hicham
    PROCEEDINGS OF THE 4TH EDITION OF NATIONAL SECURITY DAYS (JNS4), 2014, : 1 - 4
  • [10] A Blockchain-Based Retribution Mechanism for Collaborative Intrusion Detection
    Fan, Wenjun
    Kumar, Shubham
    Chang, Sang-Yoon
    Park, Younghee
    SILICON VALLEY CYBERSECURITY CONFERENCE, SVCC 2022, 2022, 1683 : 57 - 73