Skip to main content

2017 | OriginalPaper | Buchkapitel

Towards Trust-Aware Collaborative Intrusion Detection: Challenges and Solutions

verfasst von : Emmanouil Vasilomanolakis, Sheikh Mahbub Habib, Pavlos Milaszewicz, Rabee Sohail Malik, Max Mühlhäuser

Erschienen in: Trust Management XI

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Collaborative Intrusion Detection Systems (CIDSs) are an emerging field in cyber-security. In such an approach, multiple sensors collaborate by exchanging alert data with the goal of generating a complete picture of the monitored network. This can provide significant improvements in intrusion detection and especially in the identification of sophisticated attacks. However, the challenge of deciding to which extend a sensor can trust others, has not yet been holistically addressed in related work. In this paper, we firstly propose a set of requirements for reliable trust management in CIDSs. Afterwards, we carefully investigate the most dominant CIDS trust schemes. The main contribution of the paper is mapping the results of the analysis to the aforementioned requirements, along with a comparison of the state of the art. Furthermore, this paper identifies and discusses the research gaps and challenges with regard to trust and CIDSs.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Duma, C., Karresand, M., Shahmehri, N., Caronni, G.: A trust-aware, P2P-based overlay for intrusion detection. In: 17th International Workshop on Database and Expert Systems Applications, DEXA 2006, September 2006 Duma, C., Karresand, M., Shahmehri, N., Caronni, G.: A trust-aware, P2P-based overlay for intrusion detection. In: 17th International Workshop on Database and Expert Systems Applications, DEXA 2006, September 2006
2.
Zurück zum Zitat Fung, C., Zhang, J., Aib, I., Boutaba, R.: Trust management and admission control for host-based collaborative intrusion detection. J. Netw. Syst. Manag. 19, 257–277 (2011)CrossRef Fung, C., Zhang, J., Aib, I., Boutaba, R.: Trust management and admission control for host-based collaborative intrusion detection. J. Netw. Syst. Manag. 19, 257–277 (2011)CrossRef
3.
Zurück zum Zitat Fung, C.: Collaborative intrusion detection networks and insider attacks. J. Wireless Mob. Netw. Ubiquit. Comput. Dependable Appl. 2(1), 63–74 (2011) Fung, C.: Collaborative intrusion detection networks and insider attacks. J. Wireless Mob. Netw. Ubiquit. Comput. Dependable Appl. 2(1), 63–74 (2011)
4.
Zurück zum Zitat Fung, C.J., Zhang, J., Aib, I., Boutaba, R.: Dirichlet-based trust management for effective collaborative intrusion detection networks. IEEE Trans. Netw. Serv. Manag. 8(2), 79–91 (2011)CrossRef Fung, C.J., Zhang, J., Aib, I., Boutaba, R.: Dirichlet-based trust management for effective collaborative intrusion detection networks. IEEE Trans. Netw. Serv. Manag. 8(2), 79–91 (2011)CrossRef
5.
Zurück zum Zitat Habib, S.M., Volk, F., Hauke, S., Mühlhäuser, M.: Computational trust methods for security quantification in the cloud ecosystem. In: The Cloud Security Ecosystem - Technical, Legal, Business and Management Issues, pp. 463–493. Syngress (2015) Habib, S.M., Volk, F., Hauke, S., Mühlhäuser, M.: Computational trust methods for security quantification in the cloud ecosystem. In: The Cloud Security Ecosystem - Technical, Legal, Business and Management Issues, pp. 463–493. Syngress (2015)
6.
Zurück zum Zitat Mitchell, R., Chen, I.R.: A survey of intrusion detection techniques for cyber-physical systems. ACM Comput. Surv. (CSUR) 46(4), 55 (2014)CrossRef Mitchell, R., Chen, I.R.: A survey of intrusion detection techniques for cyber-physical systems. ACM Comput. Surv. (CSUR) 46(4), 55 (2014)CrossRef
7.
Zurück zum Zitat Ortega, F.J., Troyano, J.A., Cruz, F.L., Vallejo, C.G., Enríquez, F.: Propagation of trust and distrust for the detection of trolls in a social network. Comput. Netw. 56(12), 2884–2895 (2012)CrossRef Ortega, F.J., Troyano, J.A., Cruz, F.L., Vallejo, C.G., Enríquez, F.: Propagation of trust and distrust for the detection of trolls in a social network. Comput. Netw. 56(12), 2884–2895 (2012)CrossRef
8.
Zurück zum Zitat Pérez, M.G., Mármol, F.G., Pérez, G.M., Skarmeta Gómez, A.F.: Building a reputation-based bootstrapping mechanism for newcomers in collaborative alert systems. J. Comput. Syst. Sci. 80, 571–590 (2014)CrossRefMATH Pérez, M.G., Mármol, F.G., Pérez, G.M., Skarmeta Gómez, A.F.: Building a reputation-based bootstrapping mechanism for newcomers in collaborative alert systems. J. Comput. Syst. Sci. 80, 571–590 (2014)CrossRefMATH
9.
Zurück zum Zitat Pérez, M.G., Tapiador, J.E., Clark, J.A., Pérez, G.M., Skarmeta Gómez, A.F.: Trustworthy placements: Improving quality and resilience in collaborative attack detection. Comput. Netw. 58, 70–86 (2014)CrossRef Pérez, M.G., Tapiador, J.E., Clark, J.A., Pérez, G.M., Skarmeta Gómez, A.F.: Trustworthy placements: Improving quality and resilience in collaborative attack detection. Comput. Netw. 58, 70–86 (2014)CrossRef
10.
Zurück zum Zitat Vasilomanolakis, E., Karuppayah, S., Mühlhäuser, M., Fischer, M.: Taxonomy and survey of collaborative intrusion detection. ACM Comput. Surv. 47(4), 33 (2015)CrossRef Vasilomanolakis, E., Karuppayah, S., Mühlhäuser, M., Fischer, M.: Taxonomy and survey of collaborative intrusion detection. ACM Comput. Surv. 47(4), 33 (2015)CrossRef
11.
Zurück zum Zitat Yu, B., Singh, M.: Detecting deception in reputation management. In: Proceedings of the Second International Joint Conference on Autonomous Agents and Multiagent Systems (2003) Yu, B., Singh, M.: Detecting deception in reputation management. In: Proceedings of the Second International Joint Conference on Autonomous Agents and Multiagent Systems (2003)
Metadaten
Titel
Towards Trust-Aware Collaborative Intrusion Detection: Challenges and Solutions
verfasst von
Emmanouil Vasilomanolakis
Sheikh Mahbub Habib
Pavlos Milaszewicz
Rabee Sohail Malik
Max Mühlhäuser
Copyright-Jahr
2017
DOI
https://doi.org/10.1007/978-3-319-59171-1_8

Premium Partner