Visible to the public Blockchain-Based Architecture for Secured Cyber-Attack Features Exchange

TitleBlockchain-Based Architecture for Secured Cyber-Attack Features Exchange
Publication TypeConference Paper
Year of Publication2020
AuthorsAjayi, Oluwaseyi, Saadawi, Tarek
Conference Name2020 7th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/2020 6th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom)
Date PublishedAug. 2020
PublisherIEEE
ISBN Number978-1-7281-6550-9
Keywordsblockchain, compromised nodes, cyberattack, features, intrusion detection system, latency, pubcrawl, Salability, Scalability, Scalable Security, security
Abstract

Despite the increased accuracy of intrusion detection systems (IDS) in identifying cyberattacks in computer networks and devices connected to the internet, distributed or coordinated attacks can still go undetected or not detected on time. The single vantage point limits the ability of these IDSs to detect such attacks. Due to this reason, there is a need for attack characteristics' exchange among different IDS nodes. Researchers proposed a cooperative intrusion detection system to share these attack characteristics effectively. This approach was useful; however, the security of the shared data cannot be guaranteed. More specifically, maintaining the integrity and consistency of shared data becomes a significant concern. In this paper, we propose a blockchain-based solution that ensures the integrity and consistency of attack characteristics shared in a cooperative intrusion detection system. The proposed architecture achieves this by detecting and preventing fake features injection and compromised IDS nodes. It also facilitates scalable attack features exchange among IDS nodes, ensures heterogeneous IDS nodes participation, and it is robust to public IDS nodes joining and leaving the network. We evaluate the security analysis and latency. The result shows that the proposed approach detects and prevents compromised IDS nodes, malicious features injection, manipulation, or deletion, and it is also scalable with low latency.

URLhttps://ieeexplore.ieee.org/document/9170995
DOI10.1109/CSCloud-EdgeCom49738.2020.00025
Citation Keyajayi_blockchain-based_2020