首页> 外文会议>European symposium on research in computer security >Practical Bayesian Poisoning Attacks on Challenge-Based Collaborative Intrusion Detection Networks
【24h】

Practical Bayesian Poisoning Attacks on Challenge-Based Collaborative Intrusion Detection Networks

机译:基于挑战的协作入侵检测网络的实际贝叶斯中毒攻击

获取原文

摘要

As adversarial techniques constantly evolve to circumvent existing security measures, an isolated, stand-alone intrusion detection system (IDS) is unlikely to be efficient or effective. Hence, there has been a trend towards developing collaborative intrusion detection networks (CIDNs), where IDS nodes collaborate and communicate with each other. Such a distributed ecosystem can achieve improved detection accuracy, particularly for detecting emerging threats in a timely fashion (before the threat becomes common knowledge). However, there are inherent limitations due to malicious insiders who can seek to compromise and poison the ecosystem. A potential mitigation strategy is to introduce a challenge-based trust mechanism, in order to identify and penalize misbehaving nodes by evaluating the satisfaction between challenges and responses. While this mechanism has been shown to be robust against common insider attacks, it may still be vulnerable to advanced insider attacks in a real-world deployment. Therefore, in this paper, we develop a collusion attack, hereafter referred to as Bayesian Poisoning Attack, which enables a malicious node to model received messages and to craft a malicious response to those messages whose aggregated appearance probability of normal requests is above the defined threshold. In the evaluation, we explore the attack performance under both simulated and real network environments. Experimental results demonstrate that the malicious nodes under our attack can successfully craft and send untruthful feedback while maintaining their trust values.
机译:随着对抗技术不断发展以规避现有的安全措施,孤立的,独立的入侵检测系统(IDS)不太可能有效。因此,存在一种发展协作入侵检测网络(CIDN)的趋势,其中IDS节点相互协作并进行通信。这样的分布式生态系统可以提高检测精度,尤其是用于及时检测新出现的威胁(在威胁成为常识之前)。但是,由于恶意内部人员可能试图破坏和破坏生态系统,因此存在固有的局限性。潜在的缓解策略是引入基于挑战的信任机制,以通过评估挑战与响应之间的满意度来识别并惩罚行为不当的节点。尽管已证明此机制对常见的内部人员攻击具有鲁棒性,但在实际部署中,它仍可能容易受到高级内部人员攻击。因此,在本文中,我们开发了一种共谋攻击,以下称为贝叶斯中毒攻击,它使恶意节点能够对接收到的消息进行建模,并对那些正常请求的总出现概率高于定义的阈值的消息做出恶意响应。 。在评估中,我们探索了模拟和真实网络环境下的攻击性能。实验结果表明,受到攻击的恶意节点可以成功地制作并发送不真实的反馈,同时保持其信任度。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号