Towards blockchain-based collaborative intrusion detection systems

N Alexopoulos, E Vasilomanolakis, NR Ivánkó… - … , CRITIS 2017, Lucca …, 2018 - Springer
Critical Information Infrastructures Security: 12th International Conference …, 2018Springer
In an attempt to cope with the increased number of cyber-attacks, research in Intrusion
Detection System IDSs is moving towards more collaborative mechanisms. Collaborative
IDSs (CIDSs) are such an approach; they combine the knowledge of a plethora of monitors
to generate a holistic picture of the monitored network. Despite the research done in this
field, CIDSs still face a number of fundamental challenges, especially regarding maintaining
trust among the collaborating parties. Recent advances in distributed ledger technologies …
Abstract
In an attempt to cope with the increased number of cyber-attacks, research in Intrusion Detection System IDSs is moving towards more collaborative mechanisms. Collaborative IDSs (CIDSs) are such an approach; they combine the knowledge of a plethora of monitors to generate a holistic picture of the monitored network. Despite the research done in this field, CIDSs still face a number of fundamental challenges, especially regarding maintaining trust among the collaborating parties. Recent advances in distributed ledger technologies, e.g. various implementations of blockchain protocols, are a good fit to the problem of enhancing trust in collaborative environments. This paper touches the intersection of CIDSs and blockchains. Particularly, it introduces the idea of utilizing blockchain technologies as a mechanism for improving CIDSs. We argue that certain properties of blockchains can be of significant benefit for CIDSs; namely for the improvement of trust between monitors, and for providing accountability and consensus. For this, we study the related work and highlight the research gaps and challenges towards such a task. Finally, we propose a generic architecture for the incorporation of blockchains into the field of CIDSs and an analysis of the design decisions that need to be made to implement such an architecture.
Springer
以上显示的是最相近的搜索结果。 查看全部搜索结果