首页> 外文会议>IEEE Annual Ubiquitous Computing, Electronics Mobile Communication Conference >Consortium Blockchain-Based Architecture for Cyber-attack Signatures and Features Distribution
【24h】

Consortium Blockchain-Based Architecture for Cyber-attack Signatures and Features Distribution

机译:基于联盟区块链的网络攻击签名和功能分配架构

获取原文

摘要

One of the effective ways of detecting malicious traffic in computer networks is intrusion detection systems (IDS). Though IDS identify malicious activities in a network, it might be difficult to detect distributed or coordinated attacks because they only have single vantage point. To combat this problem, cooperative intrusion detection system was proposed. In this detection system, nodes exchange attack features or signatures with a view of detecting an attack that has previously been detected by one of the other nodes in the system. Exchanging of attack features is necessary because a zero-day attacks (attacks without known signature) experienced in different locations are not the same. Although this solution enhanced the ability of a single IDS to respond to attacks that have been previously identified by cooperating nodes, malicious activities such as fake data injection, data manipulation or deletion and data consistency are problems threatening this approach. In this paper, we propose a solution that leverages blockchain's distributive technology, tamper-proof ability and data immutability to detect and prevent malicious activities and solve data consistency problems facing cooperative intrusion detection. Focusing on extraction, storage and distribution stages of cooperative intrusion detection, we develop a blockchain-based solution that securely extracts features or signatures, adds extra verification step, makes storage of these signatures and features distributive and data sharing secured. Performance evaluation of the system with respect to its response time and resistance to the features/signatures injection is presented. The result shows that the proposed solution prevents stored attack features or signature against malicious data injection, manipulation or deletion and has low latency.
机译:检测计算机网络中恶意流量的有效方法之一是入侵检测系统(IDS)。尽管IDS可以识别网络中的恶意活动,但由于它们只有单个优势,因此可能很难检测到分布式或协同攻击。为了解决这个问题,提出了协同入侵检测系统。在该检测系统中,节点交换攻击特征或签名,以检测先前由系统中其他节点之一检测到的攻击。必须交换攻击功能,因为在不同位置经历的零日攻击(没有已知特征的攻击)是不同的。尽管此解决方案增强了单个IDS响应之前由协作节点识别的攻击的能力,但诸如伪造数据注入,数据操纵或删除以及数据一致性之类的恶意活动仍是威胁该方法的问题。在本文中,我们提出了一种利用区块链的分布式技术,防篡改能力和数据不变性来检测和预防恶意活动并解决协作入侵检测所面临的数据一致性问题的解决方案。我们专注于协作入侵检测的提取,存储和分发阶段,我们开发了一种基于区块链的解决方案,可安全地提取特征或签名,增加额外的验证步骤,确保这些签名和特征的分布以及数据共享的存储安全。提出了关于系统响应时间和对特征/签名注入的抵抗力的系统性能评估。结果表明,所提出的解决方案可以防止存储的攻击功能或特征码对恶意数据的注入,操纵或删除的攻击,并且具有低延迟。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号