Poster Abstract: Towards Scalable and Trustworthy Decentralized Collaborative Intrusion Detection System for IoT

02/18/2020
by   Guntur Dharma Putra, et al.
0

An Intrusion Detection System (IDS) aims to alert users of incoming attacks by deploying a detector that monitors network traffic continuously. As an effort to increase detection capabilities, a set of independent IDS detectors typically work collaboratively to build intelligence of holistic network representation, which is referred to as Collaborative Intrusion Detection System (CIDS). However, developing an effective CIDS, particularly for the IoT ecosystem raises several challenges. Recent trends and advances in blockchain technology, which provides assurance in distributed trust and secure immutable storage, may contribute towards the design of effective CIDS. In this poster abstract, we present our ongoing work on a decentralized CIDS for IoT, which is based on blockchain technology. We propose an architecture that provides accountable trust establishment, which promotes incentives and penalties, and scalable intrusion information storage by exchanging bloom filters. We are currently implementing a proof-of-concept of our modular architecture in a local test-bed and evaluate its effectiveness in detecting common attacks in IoT networks and the associated overhead.

READ FULL TEXT
research
10/21/2021

Decentralised Trustworthy Collaborative Intrusion Detection System for IoT

Intrusion Detection Systems (IDS) have been the industry standard for se...
research
09/08/2021

On Blockchain Architectures for Trust-Based Collaborative Intrusion Detection

This paper considers the use of novel technologies for mitigating attack...
research
04/08/2022

HBFL: A Hierarchical Blockchain-based Federated Learning Framework for a Collaborative IoT Intrusion Detection

The continuous strengthening of the security posture of IoT ecosystems i...
research
03/21/2022

Collaborative Learning for Cyberattack Detection in Blockchain Networks

This article aims to study intrusion attacks and then develop a novel cy...
research
04/01/2021

Augmenting Zero Trust Architecture to Endpoints Using Blockchain: A Systematic Review

With the purpose of defending against lateral movement in todays borderl...
research
02/06/2023

Decentralized Zero-Trust Framework for Digital Twin-based 6G

The Sixth Generation (6G) network is a platform for the fusion of the ph...
research
11/13/2018

Autonomic Intrusion Response in Distributed Computing using Big Data

We introduce a method for Intrusion Detection based on the classificatio...

Please sign up or login with your details

Forgot password? Click here to reset