Designing consensus algorithm for collaborative signature-based intrusion detection system
نویسندگان
چکیده
<span>Signature-based collaborative intrusion detection system (CIDS) is highly depends on the reliability of nodes to provide IDS attack signatures. Each node in network responsible new signature be shared with other node. There are two problems exist CIDS highlighted this paper, first data consistency and second maintain trust among while sharing Recently, researcher find that blockchain has a great potential solve those problems. Consensus algorithm able increase trusts allows inserted from single source truth. In we investigating three consensus algorithms: proof work (PoW), stake (PoS), hybrid PoW-PoS chain-based which possibly implemented CIDS. Finally, design an extension fulfill requirement. This name it as (PoAS).</span>
منابع مشابه
Trusted Computing Based Collaborative Intrusion Detection System
Collaboration and information sharing has obliged participating parties to look for improved detection accuracy and reaction speed in Distributed Intrusion Detection Systems (DIDS) solutions. This is mainly due to the increasing number of attacks as well as increasingly sophisticated intrusions and more alarmingly various critical components of a system can be targeted. This is further exaspera...
متن کاملAn adaptive genetic-based signature learning system for intrusion detection
Rule-based intrusion detection systems generally rely on hand crafted signatures developed by domain experts. This could lead to a delay in updating the signature bases and potentially compromising the security of protected systems. In this paper, we present a biologically-inspired computational approach to dynamically and adaptively learn signatures for network intrusion detection using a supe...
متن کاملSignature-Based Approach for Intrusion Detection
This research presents a data mining technique for discovering masquerader intrusion. User/system access data are used as a basis for deriving statistically significant event patterns. These patterns could be considered as a user/system access signature. Signature-based approach employs a model discovery technique to derive a reference ground model accounting for the user/system access data. A ...
متن کاملA Multi-Fusion Pattern Matching Algorithm for Signature-Based Network Intrusion Detection System
Security has become a critical issue in today’s highly distributed and networked systems. Network intrusion detection systems (NIDSs), especially signature-based NIDSs, are being widely deployed in a distributed network environment with the purpose of defending against a variety of network attacks. Most of the commercially available NIDSs are software based and rely on pattern matching to extra...
متن کاملExclusion-based Signature Matching for Intrusion Detection
We consider the problem of efficient string-based signature matching for Network Intrusion Detection Systems (NIDSes). String matching computations dominate in the overall cost of running a NIDS, despite the use of efficient generalpurpose string matching algorithms. Aiming at increasing the efficiency and capacity of NIDSes, we have designed ExB, a string matching algorithm tailored to the spe...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Indonesian Journal of Electrical Engineering and Computer Science
سال: 2021
ISSN: ['2502-4752', '2502-4760']
DOI: https://doi.org/10.11591/ijeecs.v22.i1.pp485-496