Blockchain: Secured Solution for Signature Transfer in Distributed Intrusion Detection System
نویسندگان
چکیده
Exchange of data in networks necessitates provision security and confidentiality. Most compromised by intruders are those where the exchange is at high risk. The main objective this paper to present a solution for secure attack signatures between nodes distributed network. Malicious activities monitored detected Intrusion Detection System (IDS) that operates with connected IDS two phases, first phase consists detection anomaly attacks using an ensemble classifiers such as Random forest, Convolutional neural network, XGBoost along genetic algorithm improve performance IDS. novel converted into exchanged further through network blockchain framework second phase. This uses cryptosystem part store it higher level. implemented Hyperledger Fabric v1.0 v2.0, create prototype signature transfer. It exchanges much more secured manner architecture when version 2.0 Fabric. proposed system evaluated on UNSW NB15 dataset. Blockchain has been terms execution time, average latency, throughput transaction processing time. Experimental evidence demonstrates improved accuracy, rate false alarm (FAR) key parameters used. Accuracy increase 2% 3% respectively whereas FAR reduces 1.7%.
منابع مشابه
Secured Intrusion Detection System in Wireless Sensor Network
Purity of such networks is a big concern, mostly for the applications where confidentiality has prime importance. Therefore, in order to function WSNs in a secure way, any kind of intrusions should be noticed before attackers can harm the network survey of the state-of-the-art in Intrusion Detection Systems (IDSs) that are proposed for WSNs is presented.RSA algorithm is using here for providing...
متن کاملIntelligent Agents for Distributed Intrusion Detection System
This paper presents a distributed intrusion detection system IDS, based on the concept of specialized distributed agents community representing agents with the same purpose for detecting distributed attacks. The semantic of intrusion events occurring in a predetermined network has been defined. The correlation rules referring the process which our proposed IDS combines the captured events that ...
متن کاملDistributed Intrusion Detection System for Computational Grids
Applying intrusion detection to the fast growing computational Grid environments improves the security which is considered to be the heart of this new field. Flexible cooperative distributed intrusion detection architecture is introduced that suits and benefits from the underlying computational Grid environment. The proposed architecture was tested using homogeneous distributed intrusion detect...
متن کاملMulti-Level and Secured Agent-Based Intrusion Detection System
Since Intrusion Detection System IDS has become necessary security tool for detecting attacks on computer network and resources, it is essential to improve previous designs. Recently many mobile agent-based IDSs have been designed, but there are still some drawbacks. Some of these drawbacks are lowdetection efficiency,high false alarm rate and agent security. A multi-level and secured IDS archi...
متن کاملQuantum-secured blockchain
E.O. Kiktenko, 2 N.O. Pozhar, M.N. Anufriev, A.S. Trushechkin, 2 R.R. Yunusov, Y.V. Kurochkin, A.I. Lvovsky, 3 and A.K. Fedorov 4 Russian Quantum Center, Skolkovo, Moscow 143025, Russia Steklov Mathematical Institute of Russian Academy of Sciences, Moscow 119991, Russia Institute for Quantum Science and Technology, University of Calgary, Calgary AB T2N 1N4, Canada LPTMS, CNRS, Univ. Paris-Sud, ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Computer systems science and engineering
سال: 2022
ISSN: ['0267-6192']
DOI: https://doi.org/10.32604/csse.2022.017130