Snort Based Collaborative Intrusion Detection System Using Blockchain in SDN

Raja Majid Ali Ujjan, Zeeshan Pervez, K. Dahal
{"title":"Snort Based Collaborative Intrusion Detection System Using Blockchain in SDN","authors":"Raja Majid Ali Ujjan, Zeeshan Pervez, K. Dahal","doi":"10.1109/SKIMA47702.2019.8982413","DOIUrl":null,"url":null,"abstract":"Due to the rapid increment of the cyber attacks, intrusion detection system (IDS) is shifting towards collaborative approaches. There is a huge demand for securing larger networking environments for providing a safeguard against threats. In order to optimize the feasible detection performance, Collaborative Intrusion Detection Networks (CIDN) approaches have been adopted in practical scenarios, which enables a group of IDS nodes to mutually share and exchange mandatory information with each other, for example, IDS-signatures, attacks alarms. However, CIDN networks are distributed in nature, such networks still face plenty of implementation problems, especially, insider intruder can easily dominate any of security node and leave the entire security system vulnerable. To achieve the trust-based communication between each of IDS node, the recent advancement in blockchain applications is considered as a good fit to create trust-based communication in CIDN networks. This work converges CIDN network and blockchain in SDN context. Firstly, we investigated existing related work and highlighted challenges and research gap towards blockchain in CIDN networks. Secondly, we utilised three collaborated Snort IDS to receive the latest signature update from Ryu and then to securely share such signatures updates to all other Snort nodes within test-bed. Our work is motivated to detect seven types of common attacks with collaborated signature-based IDS, which feasibly processes more packets to achieve satisfactory detection results. Overall the evaluation results show that with the adoption of blockchain protocols, the proposed CIDN network achieves 96% of TP rate detection rate for TCP, UDP and ICMP packets.","PeriodicalId":245523,"journal":{"name":"2019 13th International Conference on Software, Knowledge, Information Management and Applications (SKIMA)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"17","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 13th International Conference on Software, Knowledge, Information Management and Applications (SKIMA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SKIMA47702.2019.8982413","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 17

Abstract

Due to the rapid increment of the cyber attacks, intrusion detection system (IDS) is shifting towards collaborative approaches. There is a huge demand for securing larger networking environments for providing a safeguard against threats. In order to optimize the feasible detection performance, Collaborative Intrusion Detection Networks (CIDN) approaches have been adopted in practical scenarios, which enables a group of IDS nodes to mutually share and exchange mandatory information with each other, for example, IDS-signatures, attacks alarms. However, CIDN networks are distributed in nature, such networks still face plenty of implementation problems, especially, insider intruder can easily dominate any of security node and leave the entire security system vulnerable. To achieve the trust-based communication between each of IDS node, the recent advancement in blockchain applications is considered as a good fit to create trust-based communication in CIDN networks. This work converges CIDN network and blockchain in SDN context. Firstly, we investigated existing related work and highlighted challenges and research gap towards blockchain in CIDN networks. Secondly, we utilised three collaborated Snort IDS to receive the latest signature update from Ryu and then to securely share such signatures updates to all other Snort nodes within test-bed. Our work is motivated to detect seven types of common attacks with collaborated signature-based IDS, which feasibly processes more packets to achieve satisfactory detection results. Overall the evaluation results show that with the adoption of blockchain protocols, the proposed CIDN network achieves 96% of TP rate detection rate for TCP, UDP and ICMP packets.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于Snort的SDN区块链协同入侵检测系统
由于网络攻击的快速增加,入侵检测系统正朝着协作的方向发展。对于保护更大的网络环境以提供针对威胁的保护,存在着巨大的需求。为了优化可行的检测性能,在实际场景中采用了协同入侵检测网络(CIDN)方法,使一组IDS节点之间相互共享和交换强制信息,如IDS签名、攻击告警等。但是,CIDN网络具有分布式的性质,在实施过程中仍然面临着许多问题,特别是内部入侵者很容易支配任何一个安全节点,使整个安全系统处于脆弱状态。为了实现每个IDS节点之间基于信任的通信,区块链应用的最新进展被认为非常适合在CIDN网络中创建基于信任的通信。这项工作在SDN环境下融合了CIDN网络和区块链。首先,我们调查了现有的相关工作,并强调了区块链在CIDN网络中的挑战和研究差距。其次,我们使用三个协作的Snort IDS来接收来自Ryu的最新签名更新,然后将这些签名更新安全地共享给测试平台内的所有其他Snort节点。我们的工作动机是利用基于协作签名的入侵检测方法检测七种常见的攻击类型,这种方法可以处理更多的数据包以获得满意的检测结果。总体评估结果表明,采用区块链协议后,本文提出的CIDN网络对TCP、UDP和ICMP数据包的TP率检测率达到96%。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
An Under-Sampling Method with Support Vectors in Multi-class Imbalanced Data Classification Big Data with Decision Tree Induction Partitioning based incremental marginalization algorithm for anonymizing missing data streams A Deep Learning Approach to Tumour Identification in Fresh Frozen Tissues An Efficient Cryptosystem based on the Logistic-Chebyshev Map
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1