TU Darmstadt / ULB / TUbiblio

Towards Trust-Aware Collaborative Intrusion Detection: Challenges and Solutions

Vasilomanolakis, Emmanouil and Habib, Sheikh Mahbub and Milaszewicz, Pavlos and Malik, Rabee Sohail and Mühlhäuser, Max (2017):
Towards Trust-Aware Collaborative Intrusion Detection: Challenges and Solutions.
In: International Conference on Trust Management (IFIPTM), Springer International Publishing, Gothenburg, Sweden, In: Trust Management XI, 505, ISSN 1868-4238,
ISBN 978-3-319-59171-1,
DOI: 10.1007/978-3-319-59171-1,
[Online-Edition: https://doi.org/10.1007/978-3-319-59171-1_8],
[Conference or Workshop Item]

Abstract

Collaborative Intrusion Detection Systems (CIDSs) are an<br />emerging field in cyber-security. In such an approach, multiple sensors<br />collaborate by exchanging alert data with the goal of generating a complete<br />picture of the monitored network. This can provide significant improvements<br />in intrusion detection and especially in the identification of<br />sophisticated attacks. However, the challenge of deciding to which extend<br />a sensor can trust others, has not yet been holistically addressed<br />in related work. In this paper, we firstly propose a set of requirements<br />for reliable trust management in CIDSs. Afterwards, we carefully investigate<br />the most dominant CIDS trust schemes. The main contribution of<br />the paper is mapping the results of the analysis to the aforementioned<br />requirements, along with a comparison of the state of the art. Furthermore,<br />this paper identifies and discusses the research gaps and challenges<br />with regard to trust and CIDSs.

Item Type: Conference or Workshop Item
Erschienen: 2017
Creators: Vasilomanolakis, Emmanouil and Habib, Sheikh Mahbub and Milaszewicz, Pavlos and Malik, Rabee Sohail and Mühlhäuser, Max
Title: Towards Trust-Aware Collaborative Intrusion Detection: Challenges and Solutions
Language: English
Abstract:

Collaborative Intrusion Detection Systems (CIDSs) are an<br />emerging field in cyber-security. In such an approach, multiple sensors<br />collaborate by exchanging alert data with the goal of generating a complete<br />picture of the monitored network. This can provide significant improvements<br />in intrusion detection and especially in the identification of<br />sophisticated attacks. However, the challenge of deciding to which extend<br />a sensor can trust others, has not yet been holistically addressed<br />in related work. In this paper, we firstly propose a set of requirements<br />for reliable trust management in CIDSs. Afterwards, we carefully investigate<br />the most dominant CIDS trust schemes. The main contribution of<br />the paper is mapping the results of the analysis to the aforementioned<br />requirements, along with a comparison of the state of the art. Furthermore,<br />this paper identifies and discusses the research gaps and challenges<br />with regard to trust and CIDSs.

Title of Book: International Conference on Trust Management (IFIPTM)
Series Name: Trust Management XI
Volume: 505
Publisher: Springer International Publishing
ISBN: 978-3-319-59171-1
Uncontrolled Keywords: SPIN: Smart Protection in Infrastructures and Networks
Divisions: 20 Department of Computer Science
20 Department of Computer Science > Telecooperation
Profile Areas
Profile Areas > Cybersecurity (CYSEC)
Event Location: Gothenburg, Sweden
Date Deposited: 07 Jun 2018 14:33
DOI: 10.1007/978-3-319-59171-1
Official URL: https://doi.org/10.1007/978-3-319-59171-1_8
Identification Number: TUD-CS-2017-0058
Related URLs:
Export:
Suche nach Titel in: TUfind oder in Google

Optionen (nur für Redakteure)

View Item View Item