Visible to the public Protecting Consensus Seeking NIDS Modules Against Multiple Attackers

TitleProtecting Consensus Seeking NIDS Modules Against Multiple Attackers
Publication TypeConference Paper
Year of Publication2017
AuthorsToulouse, Michel, Nguyen, Phuong Khanh
Conference NameProceedings of the Eighth International Symposium on Information and Communication Technology
PublisherACM
Conference LocationNew York, NY, USA
ISBN Number978-1-4503-5328-1
KeywordsAnomaly-based, Average-Consensus Algorithm, Human Behavior, human factors, Metrics, network intrusion detection, network intrusion detection system, Outlier detection, peer to peer security, pubcrawl, Reputation-based detection, resilience, Resiliency, Scalability
Abstract

This work concerns distributed consensus algorithms and application to a network intrusion detection system (NIDS) [21]. We consider the problem of defending the system against multiple data falsification attacks (Byzantine attacks), a vulnerability of distributed peer-to-peer consensus algorithms that has not been widely addressed in its practicality. We consider both naive (independent) and colluding attackers. We test three defense strategy implementations, two classified as outlier detection methods and one reputation-based method. We have narrowed our attention to outlier and reputation-based methods because they are relatively light computationally speaking. We have left out control theoretic methods which are likely the most effective methods, however their computational cost increase rapidly with the number of attackers. We compare the efficiency of these three implementations for their computational cost, detection performance, convergence behavior and possible impacts on the intrusion detection accuracy of the NIDS. Tests are performed based on simulations of distributed denial of service attacks using the KSL-KDD data set.

URLhttps://dl.acm.org/citation.cfm?doid=3155133.3155185
DOI10.1145/3155133.3155185
Citation Keytoulouse_protecting_2017