• DocumentCode
    2695761
  • Title

    Distributed Intrusion Detection trust management through integrity and expertise evaluation

  • Author

    KhorasaniZadeh, H. ; Idris, Norbik Bashah ; Ab Manan, Jamalul-lail

  • Author_Institution
    Adv. Inf. Sch., Univ. Technol. Malaysia, Kuala Lumpur, Malaysia
  • fYear
    2012
  • fDate
    26-28 June 2012
  • Firstpage
    133
  • Lastpage
    138
  • Abstract
    Information sharing and collaboration has facilitated decision accuracy and reaction time in many applications. Distributed Intrusion Detection Systems (DIDS) solutions are one of such applications that have dramatically been transformed. This is mainly due to increasing number of attacks as well as sophisticated nature of today´s intrusions. Moreover, it has been shown that various critical components of a system can be targeted. This is further exasperated by the fact that most DIDS models do not consider attacks that targets the collaborative network itself. We specifically find this issue to be very critical and hence in this paper we propose a trust aware DIDS simulation model that is capable of categorizing each participating IDS expertise (i.e. speciality and competence), therefore helps collaborating organizations to consult our simulation model for choosing the right candidate for any type of intrusion. We call our proposed DIDS model Consultative Trusted Computing-based Collaborative IDS (CTC IDS). We utilize the Trusted Platform Module (TPM) for integrity evaluation and to fine-tune peer evaluation.
  • Keywords
    distributed processing; groupware; security of data; trusted computing; CTC IDS; DIDS model consultative trusted computing-based collaborative IDS; TPM; collaborative network; distributed intrusion detection trust management; expertise evaluation; information collaboration; information sharing; integrity evaluation; peer evaluation fine tuning; trust aware DIDS simulation model; trusted platform module; Collaboration; Computational modeling; Computer architecture; Hardware; Intrusion detection; Peer to peer computing; Software; Distributed Intrusion Detection Systems; Trust Management in Distributed Intrusion Detection;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), 2012 International Conference on
  • Conference_Location
    Kuala Lumpur
  • Print_ISBN
    978-1-4673-1425-1
  • Type

    conf

  • DOI
    10.1109/CyberSec.2012.6246102
  • Filename
    6246102