Evaluating Intrusion Sensitivity Allocation with Support Vector Machine for Collaborative Intrusion Detection

Wenjuan Li, Weizhi Meng, Lam For Kwok

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

161 Downloads (Pure)

Abstract

The aim of collaborative intrusion detection networks (CIDNs) is to provide better detection performance over a single IDS, through allowing IDS nodes to exchange data or information with each other. Nevertheless, CIDNs may be vulnerable to insider attacks, and there is a great need for deploying appropriate trust management schemes to protect CIDNs in practice. In this work, we advocate the effectiveness of intrusion sensitivity-based trust management model and describe an engineering way to automatically allocate the sensitivity values by using a support vector machine (SVM) classifier. To explore the allocation performance, we compare our classifier with several traditional supervised algorithms in the evaluation. We further investigate the performance of our enhanced trust management scheme in a real network environment under adversarial scenarios, and the experimental results indicate that our approach can be more effective in detecting insider attacks as compared with similar approaches.
Original languageEnglish
Title of host publicationInformation Security Practice and Experience
PublisherSpringer
Publication date2019
Pages453-63
ISBN (Print)978-3-030-34338-5
DOIs
Publication statusPublished - 2019
Event15th International Conference on Information Security Practice and Experience - Beijing, China
Duration: 21 Nov 201923 Nov 2019
Conference number: 15

Conference

Conference15th International Conference on Information Security Practice and Experience
Number15
Country/TerritoryChina
CityBeijing
Period21/11/201923/11/2019
SeriesLecture Notes in Computer Science
Volume11879
ISSN0302-9743

Fingerprint

Dive into the research topics of 'Evaluating Intrusion Sensitivity Allocation with Support Vector Machine for Collaborative Intrusion Detection'. Together they form a unique fingerprint.

Cite this