Visible to the public Consortium Blockchain-Based Architecture for Cyber-Attack Signatures and Features Distribution

TitleConsortium Blockchain-Based Architecture for Cyber-Attack Signatures and Features Distribution
Publication TypeConference Paper
Year of Publication2019
AuthorsAjayi, Oluwaseyi, Igbe, Obinna, Saadawi, Tarek
Conference Name2019 IEEE 10th Annual Ubiquitous Computing, Electronics Mobile Communication Conference (UEMCON)
ISBN Number978-1-7281-3885-5
Keywordsblockchain, cooperative intrusion detection, cyberattacks, data consistency, Data injection, data integrity, features, Human Behavior, human factors, IDS, latency, malicious activities, Metrics, Permissionless, pubcrawl, Scalability, security, signatures, Tamper resistance
Abstract

One of the effective ways of detecting malicious traffic in computer networks is intrusion detection systems (IDS). Though IDS identify malicious activities in a network, it might be difficult to detect distributed or coordinated attacks because they only have single vantage point. To combat this problem, cooperative intrusion detection system was proposed. In this detection system, nodes exchange attack features or signatures with a view of detecting an attack that has previously been detected by one of the other nodes in the system. Exchanging of attack features is necessary because a zero-day attacks (attacks without known signature) experienced in different locations are not the same. Although this solution enhanced the ability of a single IDS to respond to attacks that have been previously identified by cooperating nodes, malicious activities such as fake data injection, data manipulation or deletion and data consistency are problems threatening this approach. In this paper, we propose a solution that leverages blockchain's distributive technology, tamper-proof ability and data immutability to detect and prevent malicious activities and solve data consistency problems facing cooperative intrusion detection. Focusing on extraction, storage and distribution stages of cooperative intrusion detection, we develop a blockchain-based solution that securely extracts features or signatures, adds extra verification step, makes storage of these signatures and features distributive and data sharing secured. Performance evaluation of the system with respect to its response time and resistance to the features/signatures injection is presented. The result shows that the proposed solution prevents stored attack features or signature against malicious data injection, manipulation or deletion and has low latency.

URLhttps://ieeexplore.ieee.org/document/8993036
DOI10.1109/UEMCON47517.2019.8993036
Citation Keyajayi_consortium_2019