Abstract
Intrusion detection networks (IDNs) have been developed to improve the detection accuracy of a single IDS, by collecting intrusion intelligence knowledge and learning experience from other IDSs. However, some malicious IDSs within an IDN can corrupt the whole collaborative network. In this paper, we propose a robust trust management system, where each IDS evaluates the trustworthiness of its neighbors by making direct observations on their recommendations over time. We present a thresholdless clustering technique that automatically discards malicious neighbors. Our clustering approach with its effective features only needs to assume that each IDS has at least one honest neighbor. Hence, we do not need to assume that the majority of the involved IDSs are honest. Furthermore, we design an incentive utility function to penalize free-riders.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
The other possibility is to use quantification technique. However, it introduces a new parameter into the system.
- 2.
Notice that \(T_{j,i}^{\tau +1}\) is a private information of the IDS j. However, in our settings, the trust management system is centralized and a trusted third party (e.g., Dshield.org) honestly plays the roll of each IDS. Therefore, we have access to such private values.
References
Dshield dataset. https://www.dshield.org/
Alpcan, T., Basar, T.: A game theoretic approach to decision and analysis in network intrusion detection. In: Proceedings of 42nd IEEE Conference on Decision and Control, vol. 3, pp. 2595–2600. IEEE (2003)
Chen, S., Liu, D., Chen, S., Jajodia, S.: V-cops: a vulnerability-based cooperative alert distribution system. In: 22nd Annual Computer Security Applications Conference, ACSAC 2006, pp. 43–56. IEEE (2006)
Douceur, J.R.: The sybil attack. In: Druschel, P., Kaashoek, F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 251–260. Springer, Heidelberg (2002). https://doi.org/10.1007/3-540-45748-8_24
Frey, B.J., Dueck, D.: Clustering by passing messages between data points. Science 315(5814), 972–976 (2007)
Fung, C.J., Baysal, O., Zhang, J., Aib, I., Boutaba, R.: Trust management for host-based collaborative intrusion detection. In: De Turck, F., Kellerer, W., Kormentzas, G. (eds.) DSOM 2008. LNCS, vol. 5273, pp. 109–122. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-87353-2_9
Fung, C.J., Zhang, J., Aib, I., Boutaba, R.: Robust and scalable trust management for collaborative intrusion detection. In: IFIP/IEEE International Symposium on Integrated Network Management, IM 2009, pp. 33–40. IEEE (2009)
Ganeriwal, S., Balzano, L.K., Srivastava, M.B.: Reputation-based framework for high integrity sensor networks. ACM Trans. Sens. Netw. 4(3), 15:1–15:37 (2008)
Hongjun, D., Zhiping, J., Xiaona, D.: An entropy-based trust modeling and evaluation for wireless sensor networks. In: International Conference on Embedded Software and Systems, ICESS 2008, pp. 27–34. IEEE (2008)
Li, W., Meng, W., Kwok, L.F., IP, H.H.: Enhancing collaborative intrusion detection networks against insider attacks using supervised intrusion sensitivity-based trust management model. J. Netw. Comput. Appl. 77(C), 135–145 (2017)
Marchang, N., Datta, R., Das, S.K.: A novel approach for efficient usage of intrusion detection system in mobile ad hoc networks. IEEE Trans. Veh. Technol. 66(2), 1684–1695 (2017)
Nguyen, T., Seneviratne, A., Hoang, D., Nguyen, D.: Initial trust establishment for personal space IoT systems. In: IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS): MobiSec 2017 (2017)
Nielsen, M., Krukow, K., Sassone, V.: A Bayesian model for event-based trust. Electron. Notes Theor. Comput. Sci. 172, 499–521 (2007)
Rezapour, A., Tzeng, W.G.: A robust algorithm for predicting attacks using collaborative security logs (2017). Manuscript
Soldo, F., Le, A., Markopoulou, A.: Predictive blacklisting as an implicit recommendation system. In: Proceedings of the 29th Conference on Information Communications, INFOCOM 2010, pp. 1640–1648. IEEE Press, Piscataway (2010)
Srour, L., Kayssi, A., Chehab, A.: Reputation-based algorithm for managing trust in file sharing networks. In: Securecomm and Workshops, pp. 1–10. IEEE (2006)
Sun, Y.L., Yu, W., Han, Z., Liu, K.J.: Information theoretic framework of trust modeling and evaluation for ad hoc networks. IEEE J. Sel. A. Commun. 24(2), 305–317 (2006)
Tuan, T.A.: A game-theoretic analysis of trust management in P2P systems. In: First International Conference on Communications and Electronics, ICCE 2006, pp. 130–134. IEEE (2006)
Wu, Y.S., Foo, B., Mei, Y., Bagchi, S.: Collaborative intrusion detection system (CIDS): a framework for accurate and efficient IDs. In: Proceedings of the 19th Annual Computer Security Applications Conference, ACSAC 2003, p. 234. IEEE Computer Society, Washington, DC (2003)
Yegneswaran, V., Barford, P., Jha, S.: Global intrusion detection in the domino overlay system. In: NDSS (2004)
Zhang, J., Porras, P., Ullrich, J.: Highly predictive blacklisting. In: Proceedings of the 17th Conference on Security Symposium, SS 2008, pp. 107–122. USENIX Association, Berkeley (2008)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Rezapour, A., Tzeng, WG. (2018). A Robust Intrusion Detection Network Using Thresholdless Trust Management System with Incentive Design. In: Beyah, R., Chang, B., Li, Y., Zhu, S. (eds) Security and Privacy in Communication Networks. SecureComm 2018. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 255. Springer, Cham. https://doi.org/10.1007/978-3-030-01704-0_8
Download citation
DOI: https://doi.org/10.1007/978-3-030-01704-0_8
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-01703-3
Online ISBN: 978-3-030-01704-0
eBook Packages: Computer ScienceComputer Science (R0)