Skip to main content

2018 | OriginalPaper | Buchkapitel

Enhancing Intelligent Alarm Reduction for Distributed Intrusion Detection Systems via Edge Computing

verfasst von : Weizhi Meng, Yu Wang, Wenjuan Li, Zhe Liu, Jin Li, Christian W. Probst

Erschienen in: Information Security and Privacy

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

To construct an intelligent alarm filter is a promising solution to help reduce false alarms for an intrusion detection system (IDS), in which an appropriate algorithm can be selected in an adaptive way. Taking the advantage of cloud computing, the process of algorithm selection can be offloaded to the cloud, but it may cause communication delay and additional burden on the cloud side. This issue may become worse when it comes to distributed intrusion detection systems (DIDSs), i.e., some IoT applications might require very short response time and most of the end nodes in IoT are energy constrained things. In this paper, with the advent of edge computing, we propose a framework for improving the intelligent false alarm reduction for DIDSs based on edge computing devices (i.e., the data can be processed at the edge for shorter response time and could be more energy efficient). The evaluation shows that the proposed framework can help reduce the workload for the central server and shorten the delay as compared to the similar studies.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Alharkan, T., Martin, P.: IDSaaS: intrusion detection system as a service in public clouds. In: Proceedings of the 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, pp. 686–687 (2012) Alharkan, T., Martin, P.: IDSaaS: intrusion detection system as a service in public clouds. In: Proceedings of the 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, pp. 686–687 (2012)
2.
Zurück zum Zitat Armbrust, M., Fox, A., Griffith, R.: Above the clouds: a berkeley view of cloud computing. Technical report, EECS Department, University of California, Berkeley (2009) Armbrust, M., Fox, A., Griffith, R.: Above the clouds: a berkeley view of cloud computing. Technical report, EECS Department, University of California, Berkeley (2009)
3.
Zurück zum Zitat Bonomi, F., Milito, R., Zhu, J., Addepalli, S.: Fog computing and its role in the internet of things. In: Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing (MCC), pp. 13–16 (2012) Bonomi, F., Milito, R., Zhu, J., Addepalli, S.: Fog computing and its role in the internet of things. In: Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing (MCC), pp. 13–16 (2012)
4.
Zurück zum Zitat Doelitzscher, F., Reich, C., Knahl, M., Clarke, N.: An autonomous agent based incident detection system for cloud environments. In: Proceedings of the 2011 IEEE 3rd International Conference on Cloud Computing Technology and Science (CloudCom), pp. 197–204 (2011) Doelitzscher, F., Reich, C., Knahl, M., Clarke, N.: An autonomous agent based incident detection system for cloud environments. In: Proceedings of the 2011 IEEE 3rd International Conference on Cloud Computing Technology and Science (CloudCom), pp. 197–204 (2011)
5.
Zurück zum Zitat Li, W., Meng, Y., Kwok, L.-F.: Enhancing trust evaluation using intrusion sensitivity in collaborative intrusion detection networks: feasibility and challenges. In: Proceedings of the 9th International Conference on Computational Intelligence and Security (CIS), pp. 518–522 (2013) Li, W., Meng, Y., Kwok, L.-F.: Enhancing trust evaluation using intrusion sensitivity in collaborative intrusion detection networks: feasibility and challenges. In: Proceedings of the 9th International Conference on Computational Intelligence and Security (CIS), pp. 518–522 (2013)
6.
Zurück zum Zitat Li, W., Meng, W.: Enhancing collaborative intrusion detection networks using intrusion sensitivity in detecting pollution attacks. Inf. Comput. Secur. 24(3), 265–276 (2016)CrossRefMathSciNet Li, W., Meng, W.: Enhancing collaborative intrusion detection networks using intrusion sensitivity in detecting pollution attacks. Inf. Comput. Secur. 24(3), 265–276 (2016)CrossRefMathSciNet
7.
Zurück zum Zitat Li, W., Meng, Y., Kwok, L.-F., Ip, H.H.S.: PMFA: toward passive message fingerprint attacks on challenge-based collaborative intrusion detection networks. In: Proceedings of the 10th International Conference on Network and System Security (NSS), pp. 433–449 (2016)CrossRef Li, W., Meng, Y., Kwok, L.-F., Ip, H.H.S.: PMFA: toward passive message fingerprint attacks on challenge-based collaborative intrusion detection networks. In: Proceedings of the 10th International Conference on Network and System Security (NSS), pp. 433–449 (2016)CrossRef
8.
Zurück zum Zitat Li, W., Meng, Y., Kwok, L.-F., Ip, H.H.S.: Enhancing collaborative intrusion detection networks against insider attacks using supervised intrusion sensitivity-based trust management model. J. Netw. Comput. Appl. 77, 135–145 (2017)CrossRef Li, W., Meng, Y., Kwok, L.-F., Ip, H.H.S.: Enhancing collaborative intrusion detection networks against insider attacks using supervised intrusion sensitivity-based trust management model. J. Netw. Comput. Appl. 77, 135–145 (2017)CrossRef
9.
Zurück zum Zitat McHugh, J.: Testing intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln laboratory. ACM Trans. Inf. Syst. Secur. 3(4), 262–294 (2000)CrossRef McHugh, J.: Testing intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln laboratory. ACM Trans. Inf. Syst. Secur. 3(4), 262–294 (2000)CrossRef
11.
Zurück zum Zitat Meng, Y., Li, W., Kwok, L.-F.: Towards adaptive false alarm reduction using cloud as a service. In: Proceedings of the 8th International Conference on Communications and Networking in China (ChinaCom 2013), pp. 420–425, August 2013 Meng, Y., Li, W., Kwok, L.-F.: Towards adaptive false alarm reduction using cloud as a service. In: Proceedings of the 8th International Conference on Communications and Networking in China (ChinaCom 2013), pp. 420–425, August 2013
12.
Zurück zum Zitat Meng, W., Li, W., Xiang, Y., Choo, K.-K.R.: A Bayesian inference-based detection mechanism to defend medical smartphone networks against insider attacks. J. Netw. Comput. Appl. 78, 162–169 (2017)CrossRef Meng, W., Li, W., Xiang, Y., Choo, K.-K.R.: A Bayesian inference-based detection mechanism to defend medical smartphone networks against insider attacks. J. Netw. Comput. Appl. 78, 162–169 (2017)CrossRef
13.
Zurück zum Zitat Modi, C., Patel, D., Borisaniya, B., Patel, H., Patel, A., Rajarajan, M.: A survey of intrusion detection techniques in cloud. J. Netw. Comput. Appl. 36(1), 42–57 (2013)CrossRef Modi, C., Patel, D., Borisaniya, B., Patel, H., Patel, A., Rajarajan, M.: A survey of intrusion detection techniques in cloud. J. Netw. Comput. Appl. 36(1), 42–57 (2013)CrossRef
15.
Zurück zum Zitat Roschke, S., Cheng, F., Meinel, C.: Intrusion detection in the cloud. In: Proceedings of 8th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC), pp. 729–734 (2009) Roschke, S., Cheng, F., Meinel, C.: Intrusion detection in the cloud. In: Proceedings of 8th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC), pp. 729–734 (2009)
16.
Zurück zum Zitat Scarfone, K., Mell, P.: Guide to Intrusion Detection and Prevention Systems (IDPS). NIST Special Publication 800–894, February 2007 Scarfone, K., Mell, P.: Guide to Intrusion Detection and Prevention Systems (IDPS). NIST Special Publication 800–894, February 2007
18.
Zurück zum Zitat Shi, W., Cao, J., Zhang, Q., Li, Y., Xu, L.: Edge computing: vision and challenges. IEEE Internet Things J. 3(5), 637–646 (2016)CrossRef Shi, W., Cao, J., Zhang, Q., Li, Y., Xu, L.: Edge computing: vision and challenges. IEEE Internet Things J. 3(5), 637–646 (2016)CrossRef
19.
Zurück zum Zitat Vieira, K., Schulter, A., Westphall, C.B., Westphall, C.M.: Intrusion detection for grid and cloud computing. IT Prof. 12(4), 38–43 (2010)CrossRef Vieira, K., Schulter, A., Westphall, C.B., Westphall, C.M.: Intrusion detection for grid and cloud computing. IT Prof. 12(4), 38–43 (2010)CrossRef
Metadaten
Titel
Enhancing Intelligent Alarm Reduction for Distributed Intrusion Detection Systems via Edge Computing
verfasst von
Weizhi Meng
Yu Wang
Wenjuan Li
Zhe Liu
Jin Li
Christian W. Probst
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-319-93638-3_44

Premium Partner