CBSigIDS: towards collaborative blockchained signature-based intrusion detection

S Tug, W Meng, Y Wang - … on Internet of Things (iThings) and …, 2018 - ieeexplore.ieee.org
S Tug, W Meng, Y Wang
2018 IEEE International Conference on Internet of Things (iThings …, 2018ieeexplore.ieee.org
Intrusion detection systems (IDSs) are one of the most important security mechanisms that
help identify various attacks. To enhance the detection performance of a single IDS,
collaborative intrusion detection systems or networks (CIDSs or CIDNs) are often
implemented in practical organizations, which encourage a set of IDS nodes to exchange
information like alarms and signatures with each other. However, due to the distributed
nature, malicious nodes within such collaborative network are able to generate untruthful …
Intrusion detection systems (IDSs) are one of the most important security mechanisms that help identify various attacks. To enhance the detection performance of a single IDS, collaborative intrusion detection systems or networks (CIDSs or CIDNs) are often implemented in practical organizations, which encourage a set of IDS nodes to exchange information like alarms and signatures with each other. However, due to the distributed nature, malicious nodes within such collaborative network are able to generate untruthful signatures and share to others. This may significantly degrade the effectiveness and efficiency of detection. Recently, blockchain technology has received much attention from both academia and industry, which can provide a verifiable manner for distributed architectures without the need of a trusted intermediary. In this work, our motivation is thus to develop CBSigIDS, a generic framework of collaborative blockchained signature-based IDSs, which utilizes blockchains to help incrementally update a trusted signature database for different IDS nodes in a collaborative network. In the evaluation, our results show that blockchain technology can indeed help enhance the robustness and effectiveness of signature-based IDSs under adversarial scenarios via building a trusted signature database.
ieeexplore.ieee.org
以上显示的是最相近的搜索结果。 查看全部搜索结果