Abstract
The development of collaborative intrusion detection networks (CIDNs) aims to enhance the performance of a single intrusion detection system (IDS), through communicating and collecting information from other IDS nodes. To defend CIDNs against insider attacks, trust-based mechanisms are crucial for evaluating the trustworthiness of a node. In the literature, challenge-based trust mechanisms are well established to identify malicious nodes by identifying the deviation between challenges and responses. However, such mechanisms rely on two major assumptions, which may result in a weak threat model and render CIDNs still vulnerable to advanced insider attacks in a practical deployment. In this paper, our motivation is to investigate the effect of On-Off attacks on challenge-based CIDNs. In particular, as a study, we explore a special On-Off attack (called SOOA), which can keep responding normally to one node while acting abnormally to another node. In the evaluation, we explore the attack performance under simulated CIDN environments. Experimental results indicate that our attack can interfere the effectiveness of trust computation for CIDN nodes.
Original language | English |
---|---|
Title of host publication | Green, Pervasive, and Cloud Computing |
Volume | 10232 |
Publisher | Springer |
Publication date | 2017 |
Pages | 402-415 |
ISBN (Print) | 9783319571850 |
DOIs | |
Publication status | Published - 2017 |
Event | The 12th International Conference on Green, Pervasive and Cloud Computing - Cetus Hotel, Cetara, Amalfi Coast, Italy Duration: 11 May 2017 → 14 May 2017 Conference number: 12 |
Conference
Conference | The 12th International Conference on Green, Pervasive and Cloud Computing |
---|---|
Number | 12 |
Location | Cetus Hotel |
Country/Territory | Italy |
City | Cetara, Amalfi Coast |
Period | 11/05/2017 → 14/05/2017 |
Series | Lecture Notes in Computer Science |
---|---|
Volume | 10232 |
ISSN | 0302-9743 |
Keywords
- Computer Science
- Computer Communication Networks
- Information Systems Applications (incl. Internet)
- Software Engineering
- Information Storage and Retrieval
- Algorithm Analysis and Problem Complexity
- Artificial Intelligence (incl. Robotics)
- Intrusion Detection System
- Collaborative network
- On-off attacks
- Challenge-based CIDN
- Trust management