Conference paper ยท Book chapter
SOOA: Exploring Special On-Off Attacks on Challenge-Based Collaborative Intrusion Detection Networks
The development of collaborative intrusion detection networks (CIDNs) aims to enhance the performance of a single intrusion detection system (IDS), through communicating and collecting information from other IDS nodes. To defend CIDNs against insider attacks, trust-based mechanisms are crucial for evaluating the trustworthiness of a node.
In the literature, challenge-based trust mechanisms are well established to identify malicious nodes by identifying the deviation between challenges and responses. However, such mechanisms rely on two major assumptions, which may result in a weak threat model and render CIDNs still vulnerable to advanced insider attacks in a practical deployment.
In this paper, our motivation is to investigate the effect of On-Off attacks on challenge-based CIDNs. In particular, as a study, we explore a special On-Off attack (called SOOA), which can keep responding normally to one node while acting abnormally to another node. In the evaluation, we explore the attack performance under simulated CIDN environments.
Experimental results indicate that our attack can interfere the effectiveness of trust computation for CIDN nodes.
Language: | English |
---|---|
Publisher: | Springer |
Year: | 2017 |
Pages: | 402-415 |
Proceedings: | The 12th International Conference on Green, Pervasive and Cloud Computing |
Series: | Lecture Notes in Computer Science |
Journal subtitle: | 12th International Conference, Gpc 2017, Cetara, Italy, May 11-14, 2017, Proceedings |
ISBN: | 3319571850 , 3319571869 , 9783319571850 and 9783319571867 |
ISSN: | 03029743 |
Types: | Conference paper and Book chapter |
DOI: | 10.1007/978-3-319-57186-7_30 |
ORCIDs: | Meng, Weizhi |
Algorithm Analysis and Problem Complexity Artificial Intelligence (incl. Robotics) Challenge-based CIDN Collaborative network Computer Communication Networks Computer Science Information Storage and Retrieval Information Systems Applications (incl. Internet) Intrusion Detection System On-off attacks Software Engineering Trust management