Distributed Intrusion Detection System Using Blockchain and Cloud Computing Infrastructure
Distributed Intrusion Detection System Using Blockchain and Cloud Computing Infrastructure
Distributed Intrusion Detection System Using Blockchain and Cloud Computing Infrastructure
Abstract— Intrusion Detection System is a well-known updated and used for attack detection. The
term in the domain of Network and Information Security. limitation of this technique is that it will not be
It’s one of the important components of the Network and able to detect a novel attack, as a signature will
Information Security infrastructure. Host Intrusion not be available.
Detection System (HIDS) helps to detect unauthorized use,
abnormal and malicious activities on the host, whereas
Network Intrusion Detection System (NIDS) helps to detect Intrusion Detection Systems are broadly classified into
attacks and intrusion on networks. Various researchers are two categories:
actively working on different approaches to improving the
IDS performance and many improvements have been x Network Intrusion Detection System
achieved. However, development in many other technologies (NIDS):- It captures the packets from
and newly emerging techniques always opens the doors of network traffic. The header of the captured
opportunity to add a sharp edge to IDS and to make it more packets is analyzed based on various
robust and reliable. This paper proposes the development of parameters to detect malicious activities. It
Distributed Intrusion Detection System (DIDS) using can be set up in the network backbone,
emerging and promising technologies like Blockchain upon a server, switches, and gateways.
stable platform like cloud infrastructure.
xHost Intrusion Detection System (HIDS):-
Keywords— Network Intrusion Detection System It is installed on the individual system to
(NIDS), Blockchain, Cloud Computing, Distributed detect the intrusion or misuse. HIDS analyzes
Intrusion Detection System (DIDS), Host Intrusion Detection the key system files, process behaviors,
System (HIDS). unusual resource utilization, unauthorized
access, etc.
I. INTRODUCTION Based on the needs of the organization, the type of
IDS can be decided. For large organizations, NIDS will be
Intrusion Detection System (IDS) is one of the most a cheaper solution. However, it is important to understand
common security systems. It is used for the protection of that both NIDS and HIDS use different techniques and
network infrastructure and computers from malicious one cannot be considered as the substitution for others.
activities and unauthorized usages. It detects the different
types of threats. It helps users and network administrators
to take preventive measures. IDS plays an important role II. DISTRIBUTED INTRUSION DETECTION SYSTEM
in securing IT infrastructure. Intrusion detection systems As discussed in the previous section, NIDS and HIDS
capture and analyze the network traffic to detect suspicious are based on different approaches. To get the overall
activity [3][5][6]. IDS mainly works on two different protection, sometimes we need to use both types of
approaches: systems.
x Anomaly detection: - In this technique, network In a large network, multiple Network Intrusion
traffic or host OS behavior is analyzed based on Detection Systems are deployed across the network.
various parameters and compared with the Theses distributed IDS share the logs and alert
normal behavior. If the system detects any information with each other. Such an arrangement of
deviation from normal behavior, it raises an multiple IDS is called a Distributed Intrusion Detection
alarm. System (DIDS). The type and volume of information
shared among the distributed IDS is configured by the
x Misuse/Signature detection: - This technique administrator and need to be fine-tuned from time to time.
looks for a specific pattern of behavior which is It facilitates advanced persistent threat analysis, network
already known as an attack. All the malicious monitoring, and instant attack analysis of the whole
patterns and behaviors which are identified as network. It helps the administrators to get a broader view
attacks are stored in the IDS signature database. of the network attack [11].
These signature databases are continuously
Authorized licensed use limited to: Carleton University. Downloaded on August 05,2020 at 15:36:09 UTC from IEEE Xplore. Restrictions apply.
Proceedings of the Fourth International Conference on Trends in Electronics and Informatics (ICOEI 2020)
IEEE Xplore Part Number: CFP20J32-ART; ISBN: 978-1-7281-5518-0
Network monitoring and IDS alert analysis are some be more devastating. Keeping in view the resource
of the most crucial tasks. Though the security devices and requirements, scalability, and the need for computational
software can provide adequate security one cannot rely on capability, we have proposed a system that is based on
that completely. Attack patterns keep changing frequently. cloud, which can satisfy these requirements on-demand
Attackers always device new and novel techniques to basis. As the DIDS is based on the internetworking of
evade the detection and hence the security devices need to individual IDS, trust, authenticity, and reliability of the
be patched and tuned accordingly. alert received from the individual IDS is a matter of
concern. In some situations, it is possible that the attacker
Threat and alert analysis of the entire network helps has compromised a particular IDS or it is weakly
the administrators to understand the complex attack configured, which can fuzz the server with the wrong alert
patterns. Based on the analysis, a signature or set of rules and misguide the administrator. Keeping given trust,
can be generated. These can be distributed to individual authenticity, and reliability issues, we have proposed the
IDS to protect the segment of the network from a similar use of blockchain technology, which is one of the most
attack in the future [1][4][9]. promising solutions to solve these issues. The next section
briefly describes how blockchain can be used in DIDS,
A. Advantages of DIDS followed by the discussion on the integration of DIDS
With the growing size of network infrastructure, with cloud infrastructure. Blockchain is a new and
scalability and performance is always the major concern emerging technology. A detailed discussion about the
for single-mode IDS. It’s difficult for the single-mode IDS blockchain and cloud technology is beyond the scope of
to detect the attack pattern scattered across different our work and the topic of this paper. Hence only specific
geographical locations of an enterprise network. DIDS has things related to our work have been discussed in this
an advantage over single-mode IDS to collect and paper.
corroborate data among the peer IDS and detect the
stealthy attack pattern. Many times in the case of III. BLOCKCHAIN-BASED INTRUSION DETECTION
Advanced Persistent Attack, it is observed that the attack
may be initiated in some specific region of the network It is observed in recent days that attackers are applying
and then slowly spread to the entire network. In DIDS more complex and advanced techniques to attack the
since all the IDS are connected, any attack detected in a system and avoid detection. It is also possible that if any
specific region or segment of the network can help the segment of the network is misconfigured or compromised
other IDS to learn and update their rule-base. The by the attackers, then it may divert the attention of the
administrator can take preventive measures and protect network administrator. Since multiple IDS are connected
the rest of the network from attack. with the centralized server, the authenticity of the logs and
alerts received from the individual IDS raises a major
Nowadays, attack patterns are becoming more and concern [2].
more complex. With the increased complexity of attacks,
it is possible that the administrator of one network To make the overall system robust and trustworthy,
segment may not take a small incident seriously which blockchain seems to be the most reliable solution. In the
may be a part of a bigger coordinated attack. However, section, we will focus on the challenging issues of DIDS
when the attack pattern of the entire network is analyzed and how blockchain can help to resolve these [8][10][14].
together, it may represent a serious threat.
A. Challenges in Distributed Intrusion Detection
The DIDS system gives the administrators the fastest
and easiest way to identify the attacks coordinated across There are many issues in collaborating the multiple
the multiple network segments. The centralized log IDS and sharing the logs with a centralized system. Trust
analysis of distributed IDS allows the analyst to discover and authenticity are major issues that need to be resolved.
complex attack patterns and take preventive measures Following are the requirements which Distributed
easily. Intrusion Detection System should satisfy:
B. Incident Analysis with DIDS x Integrity: - The integrity of the alert generated by
individual IDS is very important. Logs and alerts
With the growing size of networks, the number of
should be tamper-proof and in no circumstances,
attacks is also increasing. Identifying the intruders and
should they be accessible and modifiable by an
malicious activities at the right time is the most important
and crucial task. One needs to know how the attack attacker or any individual.
initiated, where it initiated, what the attacker did, what the
level of threat was, and how to prevent it. x Consensus: - All the participating IDS should
have a common consensus on the type and
DIDS provides a centralized platform where the threat quality of alert generation.
can be detected instantly no matter in whatever network
segment it occurs. As it gives an advantage to the
x Scalability: - As the network size may grow and
administrator for centralized analysis, it also requires
shrink, the computational demand for the
proper planning and implementation. Since the whole
network infrastructure depends on DIDS, it should have centralized server should also be able to adjust
potential power, flexibility, and strength to detect the accordingly.
threat as quickly as possible. More delay in detection will
Authorized licensed use limited to: Carleton University. Downloaded on August 05,2020 at 15:36:09 UTC from IEEE Xplore. Restrictions apply.
Proceedings of the Fourth International Conference on Trends in Electronics and Informatics (ICOEI 2020)
IEEE Xplore Part Number: CFP20J32-ART; ISBN: 978-1-7281-5518-0
x Privacy: - Participating individual IDS should requirements become one of the most important criteria
have rights and control over selective disclose and challenge to be satisfied to build a robust DIDS
and accessibility of alert data. [13][12].
DIDS is vulnerable to attacks from inside of the
network, where the intruder has somehow got the B. Blockchain-Based Solutions
authorized access to the network. Security and reliability Blockchain provides the best promising solution to
of the central server are most crucial. The objective of satisfy the above-mentioned requirements and challenges.
central server deployment in DIDS is to collect the logs The implementation of a secure distributed ledger is
and alerts from individual IDS for centralizing analysis proposed for sharing the logs and alerts generated by the
and easy decision making. The above-mentioned individual IDS.
Authorized licensed use limited to: Carleton University. Downloaded on August 05,2020 at 15:36:09 UTC from IEEE Xplore. Restrictions apply.
Proceedings of the Fourth International Conference on Trends in Electronics and Informatics (ICOEI 2020)
IEEE Xplore Part Number: CFP20J32-ART; ISBN: 978-1-7281-5518-0
architecture is that the user can any time increase and the master node and slave nodes were configured as
decrease the computational power based on the independent IDS. Since the whole system was deployed
requirements and budget. on the cloud, communication time was reduced. However,
in real-time experiments, communication delay can be a
In our experiment, we tested the performance of the major factor to be analyzed which was out of the scope for
overall system using Auto Scaling. Amazon EC2 Auto this experiment.
Scaling helps to ensure that resources are available on-
demand to handle the load of applications. The user can In our experiment, the analysis of DIDS performance
specify the maximum and the minimum number of is carried out by performing the analysis of logs and alerts
instances in each Auto Scaling Group as per the of varying size between 500MB to 5 GB. The
requirements. Amazon EC2 auto-scaling ensures that computational power was continuously increased with the
resources are optimally utilized between the minimum and increasing size of data as shown in Table 1. The graph in
the maximum number of instances. Fig 3 shows that with the flexible scalability of the system
computing power, the performance of the system was
consistent.
VI. CONCLUSION
In this paper, we have presented the architecture of the
Distributed Intrusion Detection System using Cloud
Computing Infrastructure and Blockchain. We have
shown the performance of the DIDS server with a varying
load of data. There are many other issues like
communication delay, the overhead of blockchain, cost of
implementation, etc. which has to be discussed and
Fig 2:- Amazon EC2 Scaling analyzed.
Authorized licensed use limited to: Carleton University. Downloaded on August 05,2020 at 15:36:09 UTC from IEEE Xplore. Restrictions apply.
Proceedings of the Fourth International Conference on Trends in Electronics and Informatics (ICOEI 2020)
IEEE Xplore Part Number: CFP20J32-ART; ISBN: 978-1-7281-5518-0
Authorized licensed use limited to: Carleton University. Downloaded on August 05,2020 at 15:36:09 UTC from IEEE Xplore. Restrictions apply.