Information sharing for distributed intrusion detection systems

被引:22
|
作者
Peng, Tao [1 ]
Leckie, Christopher [1 ]
Ramamohanarao, Kotagiri [1 ]
机构
[1] Univ Melbourne, Dept Comp Sci & Software Engn, ARC Special Res Ctr Ultra Broadband Informat Netw, Melbourne, Vic 3010, Australia
基金
澳大利亚研究理事会;
关键词
distributed intrusion detection; denial of service attack; reflector attack; information sharing; anomaly detection;
D O I
10.1016/j.jnca.2005.07.004
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we present an information sharing model for distributed intrusion detection systems. The typical challenges faced by distributed intrusion detection systems is what information to share and how to share information. We address these problems by using the Cumulative Sum algorithm to collect statistics at each local system, and use a machine learning approach to coordinate the information sharing among the distributed detection systems. Our major contributions Lire two-fold. First, we propose a simple but robust scheme to monitor changes in the local statistics. Second, we present a learning algorithm to decide when to share information so that both the communication overhead among the distributed detection systems and the detection delay are minimized. We demonstrate the application of our information sharing model to a specific distributed intrusion detection scenario. We show that our approach is able to optimize the trade-off between the time required to detect an attack, and the volume of communication between the distributed intrusion detection systems. (C) 2005 Published by Elsevier Ltd.
引用
收藏
页码:877 / 899
页数:23
相关论文
共 50 条
  • [31] Distributed signal detection with information sharing among local sensors
    Liu, Xiangyang
    Min, Gang
    Cheng, Xiaoying
    Wu, Guangen
    2019 4TH INTERNATIONAL CONFERENCE ON MECHANICAL, CONTROL AND COMPUTER ENGINEERING (ICMCCE 2019), 2019, : 524 - 528
  • [32] EFFICIENT LOAD INFORMATION MANAGEMENT FOR LOAD SHARING IN DISTRIBUTED SYSTEMS
    MAHAMUNI, AB
    GONSALVES, TA
    RAMAMURTHI, B
    IFIP TRANSACTIONS C-COMMUNICATION SYSTEMS, 1993, 13 : 43 - 54
  • [33] Intrusion detection for distributed applications
    Stillerman, M
    Marceau, C
    Stillman, M
    COMMUNICATIONS OF THE ACM, 1999, 42 (07) : 62 - 69
  • [34] Information fusion techniques for reliably training intrusion detection systems
    Gargiulo, Francesco
    Mazzariello, Claudio
    Sansone, Carlo
    PROGRESS IN PATTERN RECOGNITION, 2007, : 27 - +
  • [35] The value of intrusion detection systems in information technology security architecture
    Cavusoglu, H
    Mishra, B
    Raghunathan, S
    INFORMATION SYSTEMS RESEARCH, 2005, 16 (01) : 28 - 46
  • [36] A framework for designing resilient distributed intrusion detection systems for critical infrastructures
    Genge, Bela
    Haller, Piroska
    Kiss, Istvan
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2016, 15 : 3 - 11
  • [37] Attack and Defense Strategies for Intrusion Detection in Autonomous Distributed IoT Systems
    Al-Hamadi, Hamid
    Chen, Ing-Ray
    Wang, Ding-Chau
    Almashan, Meshal
    IEEE ACCESS, 2020, 8 : 168994 - 169009
  • [38] Autonomous Federated Learning for Distributed Intrusion Detection Systems in Public Networks
    Mahmoodi, Alireza Bakhshi Zadi
    Sheikhi, Saeid
    Peltonen, Ella
    Kostakos, Panos
    IEEE ACCESS, 2023, 11 : 121325 - 121339
  • [39] Research on the strategy of large-scale distributed intrusion detection systems
    Zhu, Wen-Tao
    Li, Jin-Sheng
    Hong, Pei-Lin
    2003, Shenyang Institute of Computing Technology (24):
  • [40] Anomaly-based Intrusion Detection using Distributed intelligent systems
    Morel, Benoit
    CRISIS: 2008 THIRD INTERNATIONAL CONFERENCE ON RISKS AND SECURITY OF INTERNET AND SYSTEMS, PROCEEDINGS, 2008, : 37 - 44