Enhancing trust evaluation using intrusion sensitivity in collaborative intrusion detection Networks: Feasibility and challenges

Wenjuan Li, Yuxin Meng, Lam For Kwok

Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

51 Citations (Scopus)

Abstract

Intrusion detection systems (IDSs) have been widely deployed in computers and networks to identify a variety of attacks. But network intrusions are now becoming more and more sophisticated to detect, thus, collaborative intrusion detection networks (CIDNs) have been proposed which enables an IDS to collect information and learn experience from other IDS nodes. By maintaining interactions among a set of IDS nodes, a CIDN is expected to be more powerful in detecting some complicated attacks such as denial-of-service (DoS) than a single IDS. In real deployment, we identify that each IDS may have different levels of sensitivity in detecting different types of intrusions (i.e., based on their own signatures and settings). In this paper, we therefore define a notion of intrusion sensitivity and investigate the feasibility of using it to evaluate the trustworthiness of an IDS node. In addition, we describe several challenges when using this notion in practice. In the evaluation, the experimental results indicate that the use of intrusion sensitivity is feasible and encouraging to enhance the accuracy of detecting malicious nodes.

Original languageEnglish
Title of host publicationProceedings - 9th International Conference on Computational Intelligence and Security, CIS 2013
Pages518-522
Number of pages5
DOIs
Publication statusPublished - 2013
Externally publishedYes
Event9th International Conference on Computational Intelligence and Security, CIS 2013 - Emeishan, China
Duration: 14 Dec 201315 Dec 2013

Publication series

NameProceedings - 9th International Conference on Computational Intelligence and Security, CIS 2013

Conference

Conference9th International Conference on Computational Intelligence and Security, CIS 2013
Country/TerritoryChina
CityEmeishan
Period14/12/1315/12/13

Keywords

  • Collaborative Intrusion Detection Network
  • Intrusion Detection
  • Intrusion Sensitivity
  • Trust Management

ASJC Scopus subject areas

  • Artificial Intelligence
  • Computational Theory and Mathematics

Fingerprint

Dive into the research topics of 'Enhancing trust evaluation using intrusion sensitivity in collaborative intrusion detection Networks: Feasibility and challenges'. Together they form a unique fingerprint.

Cite this