Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.5555/956415.956425guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Collaborative Intrusion Detection System (CIDS): A Framework for Accurate and Efficient IDS

Published: 08 December 2003 Publication History

Abstract

In this paper, we present the design and implementation ofa Collaborative Intrusion Detection System (CIDS) foraccurate and efficient intrusion detection in a distributedsystem. CIDS employs multiple specialized detectors at thedifferent layers - network, kernel and application - and amanager based framework for aggregating the alarms fromthe different detectors to provide a combined alarm for anintrusion. The premise is that a carefully designed andconfigured CIDS can increase the accuracy of detectioncompared to individual detectors, without a substantialdegradation in performance. In order to validate the premise,we present the design and implementation of a CIDS whichemploys Snort, Libsafe, and a new kernel level IDS calledSysmon. The manager has a graph-based and a Bayesiannetwork based aggregation method for combining the alarmsto finally come up with a decision about the intrusion. Thesystem is evaluated using a web-based electronic store frontapplication and under three different classes of attacks -buffer overflow, flooding and script-based attacks. The resultsshow performance degradations compared to no detection of3.9% and 6.3% under normal workload and a buffer overflowattack respectively. The experiments to evaluate the accuracyof the system show that the normal workload generates falsealarms for Snort and the elementary detectors produce missedalarms. CIDS does not flag the false alarm and reduces theincidence of missed alarms to 1 of the 7 cases. CIDS can alsobe used to measure the propagation time of an intrusion whichis useful in choosing an appropriate response strategy.

Cited By

View all
  • (2018)Defending against phishing attacksTelecommunications Systems10.1007/s11235-017-0334-z67:2(247-267)Online publication date: 1-Feb-2018
  • (2017)Towards Effective Trust-Based Packet Filtering in Collaborative Network EnvironmentsIEEE Transactions on Network and Service Management10.1109/TNSM.2017.266489314:1(233-245)Online publication date: 1-Mar-2017
  • (2017)Enhancing collaborative intrusion detection networks against insider attacks using supervised intrusion sensitivity-based trust management modelJournal of Network and Computer Applications10.1016/j.jnca.2016.09.01477:C(135-145)Online publication date: 1-Jan-2017
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Guide Proceedings
ACSAC '03: Proceedings of the 19th Annual Computer Security Applications Conference
December 2003
ISBN:0769520413

Publisher

IEEE Computer Society

United States

Publication History

Published: 08 December 2003

Author Tags

  1. Bayesiannetwork based detection
  2. Event correlation
  3. False alarms
  4. Intrusion detection
  5. Missed alarms

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 09 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2018)Defending against phishing attacksTelecommunications Systems10.1007/s11235-017-0334-z67:2(247-267)Online publication date: 1-Feb-2018
  • (2017)Towards Effective Trust-Based Packet Filtering in Collaborative Network EnvironmentsIEEE Transactions on Network and Service Management10.1109/TNSM.2017.266489314:1(233-245)Online publication date: 1-Mar-2017
  • (2017)Enhancing collaborative intrusion detection networks against insider attacks using supervised intrusion sensitivity-based trust management modelJournal of Network and Computer Applications10.1016/j.jnca.2016.09.01477:C(135-145)Online publication date: 1-Jan-2017
  • (2014)DAG-based attack and defense modelingComputer Science Review10.1016/j.cosrev.2014.07.00113:C(1-38)Online publication date: 1-Nov-2014
  • (2013)Game theory meets network security and privacyACM Computing Surveys10.1145/2480741.248074245:3(1-39)Online publication date: 3-Jul-2013
  • (2010)Proposing a multi-touch interface for intrusion detection environmentsProceedings of the Seventh International Symposium on Visualization for Cyber Security10.1145/1850795.1850797(13-21)Online publication date: 14-Sep-2010
  • (2007)Automated adaptive intrusion containment in systems of interacting servicesComputer Networks: The International Journal of Computer and Telecommunications Networking10.1016/j.comnet.2006.09.00651:5(1334-1360)Online publication date: 1-Apr-2007
  • (2006)A privacy-preserving interdomain audit frameworkProceedings of the 5th ACM workshop on Privacy in electronic society10.1145/1179601.1179620(99-108)Online publication date: 30-Oct-2006
  • (2005)CIPSProceedings of the 2005 international conference on Information Networking: convergence in broadband and mobile networking10.1007/978-3-540-30582-8_10(89-98)Online publication date: 31-Jan-2005

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media