Decentralised Trustworthy Collaborative Intrusion Detection System for IoT

10/21/2021
by   Guntur Dharma Putra, et al.
0

Intrusion Detection Systems (IDS) have been the industry standard for securing IoT networks against known attacks. To increase the capability of an IDS, researchers proposed the concept of blockchain-based Collaborative-IDS (CIDS), wherein blockchain acts as a decentralised platform allowing collaboration between CIDS nodes to share intrusion related information, such as intrusion alarms and detection rules. However, proposals in blockchain-based CIDS overlook the importance of continuous evaluation of the trustworthiness of each node and generally work based on the assumption that the nodes are always honest. In this paper, we propose a decentralised CIDS that emphasises the importance of building trust between CIDS nodes. In our proposed solution, each CIDS node exchanges detection rules to help other nodes detect new types of intrusion. Our architecture offloads the trust computation to the blockchain and utilises a decentralised storage to host the shared trustworthy detection rules, ensuring scalability. Our implementation in a lab-scale testbed shows that the our solution is feasible and performs within the expected benchmarks of the Ethereum platform.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
09/08/2021

On Blockchain Architectures for Trust-Based Collaborative Intrusion Detection

This paper considers the use of novel technologies for mitigating attack...
research
02/18/2020

Poster Abstract: Towards Scalable and Trustworthy Decentralized Collaborative Intrusion Detection System for IoT

An Intrusion Detection System (IDS) aims to alert users of incoming atta...
research
03/21/2022

Collaborative Learning for Cyberattack Detection in Blockchain Networks

This article aims to study intrusion attacks and then develop a novel cy...
research
11/06/2022

Detection Of Insider Attacks In Block Chain Network Using The Trusted Two Way Intrusion Detection System

For data privacy, system reliability, and security, Blockchain technolog...
research
04/01/2021

Augmenting Zero Trust Architecture to Endpoints Using Blockchain: A Systematic Review

With the purpose of defending against lateral movement in todays borderl...
research
02/11/2020

zeek-osquery: Host-Network Correlation for Advanced Monitoring and Intrusion Detection

Intrusion Detection Systems (IDSs) can analyze network traffic for signs...
research
08/20/2023

An IoT Architecture Leveraging Digital Twins: Compromised Node Detection Scenario

Modern IoT (Internet of Things) environments with thousands of low-end a...

Please sign up or login with your details

Forgot password? Click here to reset