TU Darmstadt / ULB / TUbiblio

Towards Trust-Aware Collaborative Intrusion Detection: Challenges and Solutions

Vasilomanolakis, Emmanouil ; Habib, Sheikh Mahbub ; Milaszewicz, Pavlos ; Malik, Rabee Sohail ; Mühlhäuser, Max
Steghöfer, Jan-Philipp ; Esfandiari, Babak (eds.) (2017):
Towards Trust-Aware Collaborative Intrusion Detection: Challenges and Solutions.
In: Trust Management XI, pp. 94-109,
Springer, 11th International Conference on Trust Management (IFIPTM 2017), Gothenburg, Sweden, 12.-16.06., ISBN 978-3-319-59170-4,
DOI: 10.1007/978-3-319-59171-1_8,
[Conference or Workshop Item]

Abstract

Collaborative Intrusion Detection Systems (CIDSs) are an<br />emerging field in cyber-security. In such an approach, multiple sensors<br />collaborate by exchanging alert data with the goal of generating a complete<br />picture of the monitored network. This can provide significant improvements<br />in intrusion detection and especially in the identification of<br />sophisticated attacks. However, the challenge of deciding to which extend<br />a sensor can trust others, has not yet been holistically addressed<br />in related work. In this paper, we firstly propose a set of requirements<br />for reliable trust management in CIDSs. Afterwards, we carefully investigate<br />the most dominant CIDS trust schemes. The main contribution of<br />the paper is mapping the results of the analysis to the aforementioned<br />requirements, along with a comparison of the state of the art. Furthermore,<br />this paper identifies and discusses the research gaps and challenges<br />with regard to trust and CIDSs.

Item Type: Conference or Workshop Item
Erschienen: 2017
Editors: Steghöfer, Jan-Philipp ; Esfandiari, Babak
Creators: Vasilomanolakis, Emmanouil ; Habib, Sheikh Mahbub ; Milaszewicz, Pavlos ; Malik, Rabee Sohail ; Mühlhäuser, Max
Title: Towards Trust-Aware Collaborative Intrusion Detection: Challenges and Solutions
Language: English
Abstract:

Collaborative Intrusion Detection Systems (CIDSs) are an<br />emerging field in cyber-security. In such an approach, multiple sensors<br />collaborate by exchanging alert data with the goal of generating a complete<br />picture of the monitored network. This can provide significant improvements<br />in intrusion detection and especially in the identification of<br />sophisticated attacks. However, the challenge of deciding to which extend<br />a sensor can trust others, has not yet been holistically addressed<br />in related work. In this paper, we firstly propose a set of requirements<br />for reliable trust management in CIDSs. Afterwards, we carefully investigate<br />the most dominant CIDS trust schemes. The main contribution of<br />the paper is mapping the results of the analysis to the aforementioned<br />requirements, along with a comparison of the state of the art. Furthermore,<br />this paper identifies and discusses the research gaps and challenges<br />with regard to trust and CIDSs.

Book Title: Trust Management XI
Publisher: Springer
ISBN: 978-3-319-59170-4
Uncontrolled Keywords: SPIN: Smart Protection in Infrastructures and Networks
Divisions: 20 Department of Computer Science
20 Department of Computer Science > Telecooperation
Profile Areas
Profile Areas > Cybersecurity (CYSEC)
Event Title: 11th International Conference on Trust Management (IFIPTM 2017)
Event Location: Gothenburg, Sweden
Event Dates: 12.-16.06.
Date Deposited: 07 Jun 2018 14:48
DOI: 10.1007/978-3-319-59171-1_8
Additional Information:

IFIP Advances in Information and Communication Technology, vol 505

Identification Number: TUD-CS-2017-0058
PPN:
Corresponding Links:
Export:
Suche nach Titel in: TUfind oder in Google
Send an inquiry Send an inquiry

Options (only for editors)
Show editorial Details Show editorial Details