Consortium Blockchain-Based Architecture for Cyber-Attack Signatures and Features Distribution
Title | Consortium Blockchain-Based Architecture for Cyber-Attack Signatures and Features Distribution |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | Ajayi, Oluwaseyi, Igbe, Obinna, Saadawi, Tarek |
Conference Name | 2019 IEEE 10th Annual Ubiquitous Computing, Electronics Mobile Communication Conference (UEMCON) |
ISBN Number | 978-1-7281-3885-5 |
Keywords | blockchain, cooperative intrusion detection, cyberattacks, data consistency, Data injection, data integrity, features, Human Behavior, human factors, IDS, latency, malicious activities, Metrics, Permissionless, pubcrawl, Scalability, security, signatures, Tamper resistance |
Abstract | One of the effective ways of detecting malicious traffic in computer networks is intrusion detection systems (IDS). Though IDS identify malicious activities in a network, it might be difficult to detect distributed or coordinated attacks because they only have single vantage point. To combat this problem, cooperative intrusion detection system was proposed. In this detection system, nodes exchange attack features or signatures with a view of detecting an attack that has previously been detected by one of the other nodes in the system. Exchanging of attack features is necessary because a zero-day attacks (attacks without known signature) experienced in different locations are not the same. Although this solution enhanced the ability of a single IDS to respond to attacks that have been previously identified by cooperating nodes, malicious activities such as fake data injection, data manipulation or deletion and data consistency are problems threatening this approach. In this paper, we propose a solution that leverages blockchain's distributive technology, tamper-proof ability and data immutability to detect and prevent malicious activities and solve data consistency problems facing cooperative intrusion detection. Focusing on extraction, storage and distribution stages of cooperative intrusion detection, we develop a blockchain-based solution that securely extracts features or signatures, adds extra verification step, makes storage of these signatures and features distributive and data sharing secured. Performance evaluation of the system with respect to its response time and resistance to the features/signatures injection is presented. The result shows that the proposed solution prevents stored attack features or signature against malicious data injection, manipulation or deletion and has low latency. |
URL | https://ieeexplore.ieee.org/document/8993036 |
DOI | 10.1109/UEMCON47517.2019.8993036 |
Citation Key | ajayi_consortium_2019 |