Towards scalable and robust distributed intrusion alert fusion with good load balancing
Publication type: Proceedings Article
Publication date: 2006-09-11
Abstract
Traffic anomalies and distributed attacks are commonplace in today's networks. Single point detection is often insufficient to determine the causes, patterns and prevalence of such events. Most existing distributed intrusion detection systems (DIDS) rely on centralized fusion, or distributed fusion with unscalable communication mechanisms. In this paper, we propose to build a DIDS based on the emerging decentralized location and routing infrastructure: distributed hash table (DHT). We embed the intrusion symptoms into the DHT dimensions so that alarms related to the same intrusion (thus with similar symptoms) will be routed to the same sensor fusion center (SFC) while evenly distributing unrelated alarms to different SFCs. This is achieved through careful routing key design based on: 1) analysis of essential characteristics of four common types of intrusions: DoS attacks, port scanning, virus/worm infection and botnets; and 2) distribution and stability analysis of the popular port numbers and those of the popular source IP subnets in scans. We further propose several schemes to distribute the alarms more evenly across the SFCs, and improve the resiliency against the failures or attacks. Evaluation based on one month of DShield firewall logs (600 million scan records) collected from over 2200 worldwide providers show that the resulting system, termed Cyber Disease DHT (CDDHT), can effectively fuse related alarms while distributing unrelated ones evenly among the SFCs. It significantly outperforms the traditional hierarchical approach when facing large amounts of diverse intrusion alerts.
Found
Found
Top-30
Journals
1
2
3
4
5
6
7
8
9
|
|
Lecture Notes in Computer Science
9 publications, 16.07%
|
|
International Journal of Information Security
3 publications, 5.36%
|
|
IEEE Transactions on Network and Service Management
3 publications, 5.36%
|
|
Cluster Computing
2 publications, 3.57%
|
|
Future Generation Computer Systems
2 publications, 3.57%
|
|
ACM Computing Surveys
1 publication, 1.79%
|
|
Journal of Network and Systems Management
1 publication, 1.79%
|
|
Computers and Security
1 publication, 1.79%
|
|
Journal of Network and Computer Applications
1 publication, 1.79%
|
|
Information Fusion
1 publication, 1.79%
|
|
Journal of Parallel and Distributed Computing
1 publication, 1.79%
|
|
Transactions on Emerging Telecommunications Technologies
1 publication, 1.79%
|
|
IFIP Advances in Information and Communication Technology
1 publication, 1.79%
|
|
IEEE Transactions on Information Forensics and Security
1 publication, 1.79%
|
|
IEEE Transactions on Engineering Management
1 publication, 1.79%
|
|
Proceedings - International Symposium on Computers and Communications
1 publication, 1.79%
|
|
Advances in Intelligent Systems and Computing
1 publication, 1.79%
|
|
Journal of Information Security and Applications
1 publication, 1.79%
|
|
Information and Computer Security
1 publication, 1.79%
|
|
1
2
3
4
5
6
7
8
9
|
Publishers
5
10
15
20
25
|
|
Institute of Electrical and Electronics Engineers (IEEE)
24 publications, 42.86%
|
|
Springer Nature
17 publications, 30.36%
|
|
Elsevier
7 publications, 12.5%
|
|
Association for Computing Machinery (ACM)
3 publications, 5.36%
|
|
Wiley
1 publication, 1.79%
|
|
proceedings - international symposium on computers and communications
1 publication, 1.79%
|
|
Emerald
1 publication, 1.79%
|
|
5
10
15
20
25
|
- We do not take into account publications without a DOI.
- Statistics recalculated only for publications connected to researchers, organizations and labs registered on the platform.
- Statistics recalculated weekly.
Are you a researcher?
Create a profile to get free access to personal recommendations for colleagues and new articles.