Please use this identifier to cite or link to this item:
http://hdl.handle.net/10397/91602
Title: | Toward a blockchain-based framework for challenge-based collaborative intrusion detection | Authors: | Li, WJ Wang, Y Li, J Au, MH |
Issue Date: | Apr-2021 | Source: | International journal of information security, Apr. 2021, v. 20, no. 2, p. 127-139 | Abstract: | Network intrusions are a big threat to network and system assets, which have become more complex to date. To enhance the detection performance, collaborative intrusion detection networks (CIDNs) are adopted by many organizations to protect their resources. However, such detection systems or networks are typically vulnerable to insider attacks, so that there is a need to implement suitable trust mechanisms. In the literature, challenge-based trust mechanisms are able to measure the trustworthiness of a node by evaluating the relationship between the sent challenges and the received responses. In practice, challenge-based CIDNs have shown to be robust against common insider attacks, whereas it may still be susceptible to advanced insider attacks. How to enhance the robustness of such challenge-based CIDNs remains an issue. Motivated by the recent development of blockchains, in this work, our purpose is to design a blockchained challenge-based CIDN framework that aims to combine blockchains with challenge-based trust mechanism. Our evaluation demonstrates that blockchain technology has the potential to enhance the robustness of challenge-based CIDNs in the aspects of trust management (i.e., enhancing the detection of insider nodes) and alarm aggregation (i.e., identifying untruthful inputs) under adversary scenarios. | Keywords: | Intrusion detection Collaborative network Insider attack Blockchain technology Challenge-based trust mechanism |
Publisher: | Springer | Journal: | International journal of information security | ISSN: | 1615-5262 | EISSN: | 1615-5270 | DOI: | 10.1007/s10207-020-00488-6 | Rights: | © Springer-Verlag GmbH Germany, part of Springer Nature 2020 This is a post-peer review, pre-copyedit version of an article published in International Journal of Information Security. The final authenticated version is available online at: https://doi.org/10.1007/s10207-020-00488-6 |
Appears in Collections: | Journal/Magazine Article |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
43872-1_IJIS_AIBlock2019.pdf | Pre-Published version | 585.75 kB | Adobe PDF | View/Open |
Page views
77
Last Week
0
0
Last month
Citations as of Oct 1, 2023
Downloads
34
Citations as of Oct 1, 2023
SCOPUSTM
Citations
30
Citations as of Sep 28, 2023
WEB OF SCIENCETM
Citations
41
Citations as of Sep 28, 2023

Google ScholarTM
Check
Altmetric
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.