Decentralized detector generation in cooperative intrusion detection systems

  • Authors:
  • Rainer Bye;Katja Luther;Seyit Ahmet Çamtepe;Tansu Alpcan;Şahin Albayrak;Bülent Yener

  • Affiliations:
  • DAI-Labor, Technische Universität Berlin;DAI-Labor, Technische Universität Berlin;DAI-Labor, Technische Universität Berlin;Deutsche Telekom Laboratories, Berlin;DAI-Labor, Technische Universität Berlin;Department of Computer Science, Rensselaer Polytechnic Institute, NY

  • Venue:
  • SSS'07 Proceedings of the 9h international conference on Stabilization, safety, and security of distributed systems
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

We consider Cooperative Intrusion Detection System (CIDS) which is a distributed AIS-based (Artificial Immune System) IDS where nodes collaborate over a peer-to-peer overlay network. The AIS uses the negative selection algorithm for the selection of detectors (e.g., vectors of features such as CPU utilization, memory usage and network activity). For better detection performance, selection of all possible detectors for a node is desirable but it may not be feasible due to storage and computational overheads. Limiting the number of detectors on the other hand comes with the danger of missing attacks. We present a scheme for the controlled and decentralized division of detector sets where each IDS is assigned to a region of the feature space. We investigate the trade-off between scalability and robustness of detector sets. We address the problem of self-organization in CIDS so that each node generates a distinct set of the detectors to maximize the coverage of the feature space while pairs of nodes exchange their detector sets to provide a controlled level of redundancy. Our contribution is twofold. First, we use Symmetric Balanced Incomplete Block Design, Generalized Quadrangles and Ramanujan Expander Graph based deterministic techniques from combinatorial design theory and graph theory to decide how many and which detectors are exchanged between which pair of IDS nodes. Second, we use a classical epidemic model (SIR model) to show how properties from deterministic techniques can help us to reduce the attack spread rate.