Conference PaperPDF Available

Indra: A peer-to-peer approach to network intrusion detection and prevention

Authors:

Abstract and Figures

While the spread of the Internet has made the network ubiquitous, it has also rendered networked systems vulnerable to malicious attacks orchestrated from anywhere. These attacks or intrusions typically start with attackers infiltrating a network through a vulnerable host and then launching further attacks on the local network or Intranet. Attackers rely on increasingly sophisticated techniques like using distributed attack sources and obfuscating their network addresses. On the other hand, software that guards against them remains rooted in traditional centralized techniques, presenting an easily-targeted single point of failure. Scalable, distributed network intrusion prevention techniques are sorely needed. We propose Indra - a distributed scheme based on sharing information between trusted peers in a network to guard the network as a whole against intrusion attempts. We present initial ideas for running Indra over a peer-to-peer infrastructure to distribute up-to-date rumors, facts, and trust information in a scalable manner.
Content may be subject to copyright.
Indra: A peer-to-peer approach to network intrusion
detection and prevention
Ramaprabhu Janakiraman Marcel Waldvogel Qi Zhang
Department of Computer Science and Engineering IBM Research Microsoft Inc.
Washington University in St. Louis Zurich Research Laboratory qz@cs.wustl.edu
rama@arl.wustl.edu mwl@zurich.ibm.com
AbstractWhile the spread of the Internet has made the
network ubiquitous, it has also rendered networked sys-
tems vulnerable to malicious attacks orchestrated from any-
where. These attacks or intrusions typically start with at-
tackers infiltrating a network through a vulnerable host and
then launching further attacks on the local network or In-
tranet. Attackers rely on increasingly sophisticated tech-
niques like using distributed attack sources and obfuscating
their network addresses. On the other hand, software that
guards against them remains rooted in traditional central-
ized techniques, presenting an easily-targeted single point of
failure. Scalable, distributed network intrusion prevention
techniques are sorely needed.
We propose Indra—a distributed scheme based on shar-
ing information between trusted peers in a network to guard
the network as a whole against intrusion attempts. We
present initialideas for running Indra over a peer-to-peer in-
frastructure to distribute up-to-date rumors, facts, and trust
information in a scalable manner.
I. INTRODUCTION
A. Intrusion Detection Systems
Intrusion is the act or attempted act of using a com-
puter system or computer resources without the requisite
privileges, causing wilful or incidental damage. Intrusion
detection involves identifying individuals or machines that
perform or attempt intrusion. Intrusion Detection Systems
(IDS) are computer programs that attempt to perform intru-
sion detection by comparing observable behavior against
suspicious patterns, preferably in real-time. Intrusion is
primarily a network based activity. With increasing global
network connectivity, the topic of intrusion has gained
prominence, spurring active research on efficient IDS.
Intrusion detection systems can be classified on the ba-
sis of a multitude of factors. Some factors significant to
our project are listed below. [1] provides more and deeper
information.
The work leading to this publication was performed while all authors
were with Washington University in St. Louis.
RESPONSE TO INTRUSION: This may be passive or ac-
tive. A passive system is content with just detecting in-
trusion, leaving its handling to a second, typically human,
agency. On the other hand, an active system takes ac-
tion, for example terminating network connections to a
suspected host. Obviously, active systems can react more
quickly and to more events, but open themselves up to
denial-of-service attacks by over-reacting to deliberately
triggered false alarms.
SOURCE OF AUDIT DATA: The data to be examined
could be network data like packet traces or host data like
system call traces.
DATA COLLECTION AND PROCESSING: Data collec-
tion may be centralized or distributed. Again, this data may
be processed centrally or at distributed locations.
In recent times, there has been a lot of interest in dis-
tributed schemes for intrusion detection. While the re-
search community has been active in this area [2–8], most
existing schemes are passive in the sense that they only im-
plement the act of collecting information in a distributed
manner. The controlling intelligence is centralized in the
person of the system administrator(s) managing the admin-
istrative domain. Getting exactly the relevant information
to this central entity is a difficult task that needs to achieve
a fine balance between overloading the administrator or not
providing enough information. Therefore, an autonomous
system is needed to augment or eventually replace this cen-
tral entity.
B. Outline of this paper
The motivations and current design of the Indra system
are described in Section II. Section III discusses the de-
ployment of Indra over peer-to-peer (P2P) systems. In Sec-
tion IV, we discuss issues with trust and key distribution.
In Sections V and VI, we propose a plugin mechanism that
provides for dynamic extensibility in Indra. We discuss
future and related work in Sections VII and VIII, respec-
tively, and summarize in Section IX.
1
II. INDRA
Project Indra is named after an Indian God credited with
a protective function. It also expands to INtrusion Detec-
tion and Rapid Action, which describes its goal and func-
tionality with surprising accuracy, given that the acronym
was retro-fitted.
A. Attacks on Immune Systems
Indra is an intrusion detection tool that takes a proac-
tive and P2P approach to network security. It is often the
case that attackers try out common exploits on different
machines, hoping to stumble upon a machine on which
a particular vulnerability is extant. Sometimes these at-
tacks are detected and repulsed by intrusion detection soft-
ware in place on a particular machine. But a persistent at-
tacker, after many attempts [9], eventually manages to find
a weak link in the chain. The broad goals of project Indra
is to distribute such attempt information (gathered by the
intended victim) among all interested peers in a P2P net-
work. This allows the system to react, either proactively
(e.g., by applying patches, temporarily disconnecting ser-
vices, or both) or retroactively (e.g., disconnect machines
that may have been compromised, to limit further damage).
The chance that at least one of the machines does no-
tice an attack to which it is not itself vulnerable increases
with the number of machines, the heterogeneity of the
machines (operating systems and/or applications), and the
level of currency of the applied security fixes. This makes
it very attractive to have a system spreading such informa-
tion quickly and widely.
B. Neighborhood Watch
Each interested host on the P2P network runs a special
security daemon, the Indra daemon, which both watches
out for intrusion attempts and also enforces access control
based on its memory of earlier attempts. The P2P network
needs to be reliable and trusted. This is achieved by apply-
ing trust management schemes such as the Web of Trust as
known from PGP [10]. Extreme care must be taken when
implementing the system not to open any security holes or
opportunities for denial-of-service attacks.
Besides notifications occuring when immune systems
see an attack on themselves (see above), it is also possi-
ble for other machines (“neighbors”) sharing a network to
detect other hosts as being under attack. This is particu-
larly effective if the network is a shared medium, but the
same effect can be achieved by installing Indra on network
gateways or on a machine attached to a “snoop” port of a
network switch. In particular, as shown in Figure 1, the
following sequence of events could occur. Please note that
Attacker
X
X
X
A
B
C
(1)
(2)
(3)
(4)
(5)
X
Initial Attempt
Subsequent Attempts
Warning
Fig. 1. Neighborhood Watch with Indra
in Figure 1, at least host C needs to be able to listen to B’s
network traffic.
1) The attacker on A finds the weak access point B in
the network.
2) The attacker initiates attacks from B
1
to hosts in the
trusted network to which the host C is connected. It
is assumed that all hosts in the network, including C,
run Indra daemons.
3) The Indra daemon at C detects the attack from B and
then multicasts a secure warning message regarding
B to its trusted neighbors.
4) Each Indra daemon receives the message from C,
verifies its integrity and then places B on a ‘black-
list’ of suspected intrusion sources.
5) The attacker, having failed in his attempt on C, tries
it out with other hosts in the same domain. These
subsequent attacks are repelled straightaway by the
forewarned hosts.
While this ideal situation is easy to spell out, it presents
practical difficulties at various levels that have to be over-
come first:
COMMUNICATION: How do the daemons communicate
with each other? How do they transmit a message to all
the other daemons? Some communication model has to be
devised.
TRUST: How do the daemons trust messages and their
senders? Obviously, messages have varying importance
depending on who sends them.
POLICY: Suppose intrusion is suspected. How do the
daemons react to it? Solutions can range from paranoia to
indifference.
In the next few sections, we deal with each of these in
turn.
1
or a sequence of such Bs
2
III. PEER-TO-PEER COMMUNICATION AND INDRA
Indra relies on efficient group communication primitives
in the underlying network in order to exchange intrusion
information with peers. We argue that P2P systems, by
providing fast and fault-tolerant primitives for search and
data retrieval, provide an ideal platform on which Indra can
be deployed.
As a case in point, we consider the Scribe [11] project,
which overlays a topic-based publish-subscribe multicast
mechanism on top of the Pastry peer-to-peer network [12].
In this scheme, Indra nodes are part of the Pastry net-
work and communicate using Scribe groups, as shown in
Figure 2.
SSH Vulnerabilities
DOS Attacks
Indra Nodes
PASTRY nodes
Fig. 2. Indra over Pastry and Scribe: The grey-colored nodes in the
network are subscribed to messages related to SSH vulnerabilities, and
the black ones to Denial-of-service attacks. Physically, both kinds of
nodes are connected to the Pastry overlay network and communicate
using the Scribe multicast protocol.
As an alternative to the deterministic multicast mecha-
nisms outlined above, rumor-spreading models of commu-
nication have been proposed where each node propagates
information to a randomized subset of its neighbors [13].
Such mechanisms are particularly relevant to Indra, since
they enable Indra to be deployed on any peer-to-peer net-
work without the additional overhead of creating multicast
trees for each topic.
No matter what the actual communication substrate is,
we believe Indra can effectively leverage the power and
robustness of peer-to-peer networks. For example, the
Gnutella [14] network allows end hosts to maintain mul-
tiple simultaneous connections with the network. This
means that any group communication application built over
Gnutella will naturally inherit the inherent fault-tolerance
present in Gnutella and similar overlay networks.
A. Indra for Load-balancing
A significant advantage of distributed schemes in gen-
eral, and Indra in particular, is that they may be used to bal-
ance the load on the detecting agent over many machines in
the network. In modern high-speed networks, doing any-
thing on a per-packet basis at link rates is getting increas-
ingly difficult. Indeed, even a fairly simple operation like
looking up the longest matching IPprefix becomes a bottle-
neck that calls for sophisticated techniques [15]. Therefore
it is clearly infeasible to run a packet-scanning agent on a
single bottleneck router. Schemes like Indra offer a way
to distribute this load over hosts on the network. We are
investigating efficient load-balancing schemes for this pur-
pose, including randomized packet sampling techniques.
IV. TRUST AND KEY DISTRIBUTION
Trust is an important issue in an intrusion-detection sys-
tem, more so in the absence of a centralized trusted author-
ity to provide digital certificates (Certification Authority,
CA). The usual decentralized alternate to central CAs is
the web-of-trust model, where certifying happens among
peers rather than from a central authority.
Our work on this is rather less concrete than that of In-
dra itself. In the prototype version, we rely on trusted key-
servers from which Indra gets certificates for its peers. In
a decentralized P2P system, variants of the Web of trust
model from PGP [10] are more realistic. In this model,
as shown in Figure 3, nodes are connected by trust rela-
tionships shown by edges, where edge weights represent
degrees of trust. In reality, some nodes have pre-assigned
trust values on entry, while trust values of other nodes must
be computed based on their trust relationships. While there
has been some work on trust metrics [16,17] in a Web-of-
trust model, this is currently an area of active research.
Untrusted nodePreassigned trust
Trusting node
Fig. 3. Web of trust: the problem facing the node labeled “Trusting
node” is to determine the extent to which it may trust untrusted nodes
based on endorsements from other nodes which it does trust.
V. INDRA DAEMONS
At the topmost level, all the functionality of Indra is
achieved by a set of daemons which, in our implementa-
3
PluginLoader
Listener
Watcher
1
Watcher
2
Watcher
n
Access
Controller
1
Access
Controller
2
Access
Controller
m
Service 1
Service 2
Service m
Input 1
Input 2
Input n
Input n+1
m + 1
Service
Reporter
Watcher
n+1
Access
Controller
m + 1
Fig. 4. Indra Daemons
tion, correspond to Java threads. These daemons belong to
one of the following classes.
WATCHERS: These are the first level daemons that are
on the outlook for any suspicious activity, either on the lo-
cal system or over the network, for example multiple failed
login attempts, port-scan attempts or suspicious system-
call sequences.
ACCESS CONTROLLERS: These daemons provided
controlled access to resources. The control is dynamic and
depends on what the listeners tell them to do. When they
get a warning against a particular user-id on a machine,
they selectively filter out access to that particular (account,
machine) combination. For determining accounts, it uses
the IDENT protocol [18]. We are investigating enhance-
ments to the IDENT protocol to incorporate digital signa-
tures and the use of STOP [19].
LISTENERS: These aredaemons that listen tothe watch-
ers. Listeners aggregate the warnings that are generated by
the Watchers. Then based on the security level or any other
policy dictated by the administrator, the listeners convey
the warnings to the Access Controllers. Listeners are es-
sentially selective filters that stand between the watchers
and access controllers. If watchers were sense organs and
access controllers limbs, the listener would be the central
intelligence that drives motor function based on sensory in-
put. For example, certain kinds of exploit attempts might
result in vulnerable services being denied while other, pre-
sumably secure, services continue to operate normally.
REPORTERS: These daemons are responsible for com-
municating with other hosts, either receiving warnings and
passing them on to the listeners or receiving aggregated
warnings from listeners and passing them along the net-
work to other hosts.
The daemons could be configured by the system admin-
istrator for different levels of security. For example, a host
with critical information could be configured to deny all
network connections to a machine which is identified as
an originator of repeated failed logins. At another level,
routers could run security agents that cut off packets that
originate from a compromised machine, effectively isolat-
ing the machine from the network. Instead of taking it upon
itself to make all these decisions, Indra provides a scaffold
or framework that allows these options to be implemented
by the administrator with ease.
VI. INDRA PLUGINS
Indra provides a mechanism by which additional dae-
mons
2
can be plugged in at run-time into the Indra system.
Whenever the administrator needs to change the security
policy, either because a new exploit has surfaced or the se-
curity concerns have changed, she can write Java code that
implements the necessary functionality and E-Mail or dis-
tribute it to interested peer daemons. These modules will
be authenticated against the administrator’s public key by
the Plugin manager and then dynamically loaded into the
daemon’s address space.
We find that using Java for our implementation serves us
well here. Code that compiles to native machine code, with
its ability to forge pointers to arbitrary memory locations
and to execute any combination of native machine instruc-
tions, is extremely difficult to audit or validate. Java, with
its concept of a virtual machine as a sandbox, allows fine
grained access control to resources, enabling different se-
curity policies for inbuilt code and code that is loaded over
the network. This is analogous to executing Java applets
securely inside the context of a browser.
VII. RESEARCH AGENDA
Indra is very much work-in-progress. We have a proto-
type implementation working, but it is too bare-bones to
be useful in practice. For example, we use simple port-
logging or failed-login counts as indicators of intrusion at-
tempts. Overall, the fundamental contribution of Indra is
not that of new intrusion detection techniques. Instead,
we have tried to provide a framework that complements
these techniques and help them maintain relevance in a
massively networked scenario.
Ongoing research on Indra is on several fronts: The most
important issue is that of trusting sources in a P2P sys-
tem in the absence of centralized certifying authorities. We
are investigating variations on the Web of trust model [10]
which are appropriate for deploying Indra in a decentral-
ized P2P manner. In addition, we will be using reliability
measures as described in CONFIDANT [20].
2
Watchers, Listeners or AccessControllers
4
Another area of interest is information propagation
mechanisms for multi-party communication in P2P net-
works. We find that the publish-subscribe model described
in [11] is closest to our work. Another area of relevant re-
search is work on randomized rumor-spreading techniques
[13] as a scalable alternative to deterministic flooding.
Currently, security advisories are written for system-
administrators. However, it is a notorious fact that
many system administrators are tardy in applying security
patches. For example, more than a year after the discov-
ery of the critical CRC32 bug [21], over 30% of the SSH
servers still were vulnerable. Reasons that administrators
do not update their systems include lack of time, but also
fear of breaking existing applications and systems. We be-
lieve that a more selective approach like Indra may help
keep systems secure even when updates have not been ap-
plied.
An interesting area of future research is on machine-
readable advisories written in XML, which Indra daemons
can autonomously act on.
Further, we are working on a standard and flexible in-
terface to writing security plugins for Indra. Ultimately,
this would enable the advisory agency to write plugin mod-
ules as soon as a vulnerability is detected, and place signed
copies on the P2P network. As an alternative to P2P sys-
tems, an efficient multicast transport mechanism like SRM
[22] or ALMI [23] could be used, if and when such mech-
anisms are widely deployed over the Internet. In any case,
we predict turn-around time to be of the order of a few
minutes, for machines distributed throughout the Internet.
VIII. RELATED WORK
The idea of using distributed intrusion detection has
been proposed with several variations over the past decade.
Schemes have been proposed using distributed data col-
lection and, in relatively fewer cases, distributed analysis
agents.
An interesting approach to this problem using concepts
of Immunology is [24]. The power of epidemics in net-
working has also recently gained interest [25]. The Dis-
tributed Firewall scheme [26] proposes a central access
control access policy which is enforced by individual end-
points. The NADIR system [2] uses distributed data col-
lection and centralized analysis by an expert system.
The GrIDS project [3] uses data source modules run-
ning in each host to extract information, which is used by
graph engines to build a graph representation of network
activity. GrIDS is again a purely a passive detection-based
scheme, with corrective action presumably left to the sys-
tem administrator. AAFID architecture [4] describes a dis-
tributed IDS based on multiple autonomous agents that can
be added and removed from a system on the fly. There is no
facility for automated handling of Intrusions, i.e., AAFID
is a passive IDS.
The two schemes that are most closely related to Indra
are Cooperating Security Managers (CSM) [5] and EMER-
ALD [6]. CSM is an peer based IDS designed for use in
a distributed network environment. Each CSM acts like a
host-based local IDS for its host, while additionally coop-
erating with other CSMs without the use of a central con-
troller. EMERALD is a powerful distributed IDS that is
active and distributed. However, it does not seem to sup-
port on-the-fly plugin upgrades.
CITRA [27] proposes autonomic responses to dis-
tributed denial of service attacks by contacting upstream
nodes in the path of the attack. An interesting area of fu-
ture work is to implement CITRA-like responses to intru-
sion on top of the peer-to-peer mechanisms proposed by
INDRA.
IX. SUMMARY
As the global Internet becomes increasingly pervasive,
computer intrusion and its prevention assumes greater im-
portance. To be scalable with exploding network sizes, it is
imperative that IDSs be distributed and self-maintaining.
In this paper, we argue the case of distributed intrusion-
detection systems running over P2P networks. We describe
the design of such a scheme, Indra, which promises to scale
well under increasing network sizes and more determined
attackers. We believe Indra, by leveraging the resilience of
the underlying P2P network, has the potential to provide a
robust intrusion detection system even in the face of con-
certed attacks.
At the frenetic pace at which software is written and de-
ployed over the network, new vulnerabilities in networked
systems crop up as fast as older ones are detected and
plugged. In such a scenario, protection systems need to
be pluggable to keep up with the latest bug-reports. Indra
offers a scalable solution by providing for security plugins
that can be loaded on the fly simultaneously by thousands
of machines in an administrative domain.
REFERENCES
[1] S. Axelsson. Research in intrusion-detection systems: A survey.
Technical Report 98–17, Department of Computer Engineering,
Chalmers University of Technology, December 1998.
[2] Judith Hochberg, Kathleen Jackson, Cathy Stallings, J. F.
McClary, David DuBois, and Josephine Ford. Nadir: An auto-
mated system for detecting network intrusion and misuse. Com-
puters & Security, 12(3):235–248, 1993.
[3] S. Cheung, R. Crawford, M. Dilger, J. Frank, J. Hoagland,
K. Levitt, J. Rowe, S. Staniford-Chen, R. Yip, and D. Zerkle.
The design of grids: A graph-based intrusion detection system.
Technical Report CSE-99-2, U.C. Davis Computer Science De-
partment, January 1999.
5
[4] J. S. Balasubramaniyan, J. O. Garcia-Fernandez, D. Isacoff,
E. Spafford, and D. Zamboni. An architecture for intrusion de-
tection using autonomous agents. Technical Report 98/05, Purdue
University, 1998.
[5] G. White, E. Fisch, and U. Pooch. Cooperating security man-
agers: A peer-based intrusion detection system. IEEE Network,
10(1):20–23, 1994.
[6] P. A. Porras and P. G. Neumann. EMERALD: event monitoring
enabling responses to anomalous live disturbances. In Proceed-
ings of the 20th National Information Systems Security Confer-
ence, pages 353–365, October 1997.
[7] G. Helmer, J. Wong, V. Honavar, and L. Miller. Intelligent agents
for intrusion detection. In IEEE Information Technology Confer-
ence, pages 121–124, September 1998.
[8] M. Crosbie and G. Spafford. Defending a computer system using
autonomous agents. Technical Report 95-022, Dept. of Computer
Sciences, Purdue University, Mar 1996.
[9] J. Howard. An Analysis of Security Incidents on the Internet. PhD
thesis, Carnegie Mellon University, 1998.
[10] William Stallings. Pretty Good Privacy. ConneXions, 8(12):2–11,
December 1994.
[11] Antony I. T. Rowstron, Anne-Marie Kermarrec, Miguel Castro,
and Peter Druschel. SCRIBE: The design of a large-scale event
notification infrastructure. In Networked Group Communication,
pages 30–43, 2001.
[12] Anthony Rowstron and Peter Druschel. Pastry: Scalable, dis-
tributed object location and routing for large-scale peer-to-peer
systems. In IFIP/ACM International Conference on Distributed
Systems Platforms (Middleware), pages 329–350, Heidelberg,
Germany, November 2001.
[13] Richard M. Karp, Christian Schindelhauer, Scott Shenker, and
Berthold V¨ocking. Randomized rumor spreading. In IEEE Sym-
posium on Foundations of Computer Science, pages 565–574,
2000.
[14] The Gnutella Network. http://www.gnutella.com.
[15] Marcel Waldvogel, George Varghese, Jon Turner, and Bernhard
Plattner. Scalable high-speed prefix matching. Transaction on
Computer Systems, 19(4):440–482, November 2001.
[16] Ueli Maurer. Modelling a public-key infrastructure. In ESORICS:
European Symposium on Research in Computer Security. LNCS,
Springer-Verlag, 1996.
[17] Michael K. Reiter and Stuart G. Stubblebine. Path independence
for authentication in large-scale systems. In ACM Conference on
Computer and Communications Security, pages 57–66, 1997.
[18] Identification protocol. Internet RFC 1413, http://www.faqs.org/
rfcs/rfc1413.html, 1993.
[19] Brian Carrier and Clay Shields. A recursive session token protocol
for use in computer forensics and tcp traceback. In Proceedings
of Infocom 2002, pages 1540–1546, June 2002.
[20] Sonja Buchegger and Jean-Yves Le Boudec. Performance Anal-
ysis of the CONFIDANT Protocol: Cooperation Of Nodes—
Fairness In Dynamic Ad-hoc NeTworks. In Proceedings of
IEEE/ACM Symposium on Mobile Ad Hoc Networking and Com-
puting (MobiHOC), Lausanne, June 2002. IEEE.
[21] Roman Danyliw, Chad Dougherty, and John Shaffer. Exploitation
of vulnerability in SSH1 CRC-32 compensation attack detector.
Incident Note IN-2001-12, CERT, November 2001.
[22] Sneha Kumar Kasera, James F. Kurose, and Donald F. Towsley.
Scalable reliable multicast using multiple multicast groups. In
Measurement and Modeling of Computer Systems, pages 64–74,
1997.
[23] Dimitris Pendarakis, Sherlia Shi, Dinesh Verma, and Marcel
Waldvogel. ALMI: An application level multicast infrastructure.
In Proceedings of the 3rd USNIX Symposium on Internet Tech-
nologies and Systems (USITS ’01), pages 49–60, San Francisco,
CA, USA, March 2001.
[24] S. Forrest, S. Hofmeyr, and A. Somayaji. Computer immunology.
In Communications of the ACM, (submitted Dec. 1996), 1996.
[25] Werner Vogels, Robbert vanRenesse, and Ken Birman. The power
of epidemics: Robust communication for large-scale distributed
systems. Computer Communication Review, 33(1), January 2003.
Proceedings of HotNets-I.
[26] S. Ioannidis, A. Keromytis, S. Bellovin, and J. Smith. Imple-
menting a distributed firewall. In Proceedings of Computer and
Communications Security (CCS), November 2000.
[27] Dan Sterne et al. Autonomic response to distributed denial of
service attacks. In Proceedings of RAID 2001, October 2001.
6
... Netbait [23] Distributed 2003 It is a planetary-scale service for distributed detection of Internet worms. Indra [67] Distributed 2003 It is an intrusion detection tool that takes a P2P approach to identify intrusions. DOMINO [224] Decentralized 2004 It fosters collaboration among heterogeneous nodes organized as an overlay network. ...
... 12) Indra: This is a distributed scheme that protects the deployed environment against intrusion attempts, through sharing data and information among various network nodes [67]. Each node can monitor any suspicious events and behavior by deploying an Indra daemon, which can also help enforce a security policy. ...
Article
Full-text available
Owing to the swift growth in cyber attacks, intrusion detection systems (IDSs) have become a necessity to help safeguard personal and organizational assets. However, with the increasing size of computer networks, it becomes difficult for a stand-alone IDS to identify sophisticated and advanced threats, such as DDoS attack, due to the lack of contextual information and knowledge regarding the deployed environments. To tackle this issue, distributed and collaborative IDSs (DIDSs and CIDSs) are developed, which enable a set of IDS nodes to operate in a collaborative way through exchanging required information. In this survey, we first summarize the state-of-the-art for traditional DIDSs according to the collaboration topology, e.g., centralized, decentralized, and distributed, and discuss major external and internal threats. Because of the distributed nature and various threats, trust is often enforced among various IDS nodes. We then summarize the relevant research on trust-based DIDSs/CIDSs in a chronological order. Also, we highlight challenges and future directions in this field. The main purpose of this survey is to stimulate more research efforts in developing robust and practical trust-based collaborative intrusion detection.
... Attack to the VPN A solution is suggested in [53,54]. ...
Article
Full-text available
Cyber threats and vulnerabilities present an increasing risk to the safe and frictionless execution of business operations. Bad actors (“hackers”), including state actors, are increasingly targeting the operational technologies (OTs) and industrial control systems (ICSs) used to protect critical national infrastructure (CNI). Minimisations of cyber risk, attack surfaces, data immutability, and interoperability of IoT are some of the main challenges of today’s CNI. Cyber security risk assessment is one of the basic and most important activities to identify and quantify cyber security threats and vulnerabilities. This research presents a novel i-TRACE security-by-design CNI methodology that encompasses CNI key performance indicators (KPIs) and metrics to combat the growing vicarious nature of remote, well-planned, and well-executed cyber-attacks against CNI, as recently exemplified in the current Ukraine conflict (2014–present) on both sides. The proposed methodology offers a hybrid method that specifically identifies the steps required (typically undertaken by those responsible for detecting, deterring, and disrupting cyber attacks on CNI). Furthermore, we present a novel, advanced, and resilient approach that leverages digital twins and distributed ledger technologies for our chosen i-TRACE use cases of energy management and connected sites. The key steps required to achieve the desired level of interoperability and immutability of data are identified, thereby reducing the risk of CNI-specific cyber attacks and minimising the attack vectors and surfaces. Hence, this research aims to provide an extra level of safety for CNI and OT human operatives, i.e., those tasked with and responsible for detecting, deterring, disrupting, and mitigating these cyber-attacks. Our evaluations and comparisons clearly demonstrate that i-TRACE has significant intrinsic advantages compared to existing “state-of-the-art” mechanisms.
... Solutions to tackle this problem have been proposed in the literature. For example, to detect message tampering and forging, the authors in [31] proposed a digital signature and cryptographic hash-based authentication solution for alert messages in a peer-to-peer CIDS architecture. In addition, to detect selfish IDS nodes sending incomplete/incorrect information, Chen et al. [32] proposed the use of a "Web of Trust" between participating nodes, in which the quality of the exchanged information can be measured by the reputation of the nodes. ...
Article
Full-text available
Vehicular Social Networks (VSNs) have emerged as a new social interaction paradigm, where vehicles can form social networks on the roads to improve the convenience/safety of passengers. VSNs are part of Vehicle to Everything (V2X) services, which is one of the industrial verticals in the coming sixth generation (6G) networks. The lower latency, higher connection density, and near-100% coverage envisaged in 6G will enable more efficient implementation of VSNs applications. The purpose of this study is to address the problem of lateral movements of attackers who could compromise one device in a VSN, given the large number of connected devices and services in VSNs and attack other devices and vehicles. This challenge is addressed via our proposed Blockchain-based Collaborative Distributed Intrusion Detection (BCDID) system with a novel Dynamic Throttling Strategy (DTS) to detect and prevent attackers’ lateral movements in VSNs. Our experiments showed how the proposed DTS improve the effectiveness of the BCDID system in terms of detection capabilities and handling queries three times faster than the default strategy with 350k queries tested. We concluded that our DTS strategy can increase transaction processing capacity in the BCDID system and improve its performance while maintaining the integrity of data on-chain.
... In some cases, this is prevented either by compromised devices, or the lack of willingness, as in the case of different organizations to share. Intrusion Detection and Rapid Action (INDRA), a DCIDS approach based on peer-to-peer (P2P) infrastructure by Janakiraman et al, 50 proposes an authentication-based solution for alert messages. Specifically, message authentication based on digital signatures is used to provide a reasonable level of assurance that alerts are originating from a trusted node by using a central certification authority to authenticate a node's credentials. ...
Article
With the purpose of defending against lateral movement in today's borderless networks, zero trust architecture (ZTA) adoption is gaining momentum. With a full-scale ZTA implementation, it is unlikely that adversaries will be able to spread through the network starting from a compromised endpoint. However, the already authenticated and authorized session of a compromised endpoint can be leveraged to carry out limited, though malicious, activities ultimately rendering the endpoints the Achilles heel of ZTA. To effectively detect such attacks, distributed collaborative intrusion detection systems with an attack scenario-based approach have been developed. Nonetheless, advanced persistent threats have demonstrated their ability to bypass this approach with a high success ratio. As a result, adversaries can pass undetected or potentially alter the detection logging mechanisms to achieve a stealthy presence. Recently, blockchain technology has demonstrated solid use cases in the cyber security domain. In this paper, motivated by the convergence of ZTA and blockchain-based intrusion detection and prevention, we examine how ZTA can be augmented onto endpoints. Namely, we perform a state-of-the-art review of ZTA models, real-world architectures with a focus on endpoints, and blockchain-based intrusion detection systems. We discuss the potential of blockchain's immutability fortifying the detection process and identify open challenges as well as potential solutions and future directions.
... Indra [139] NetShield [141] est un IDS distribué qui repose sur la DHT Chord [63]. Dans ce système, les IDS participant contribuent et récupèrent les données via l'overlay pair-à-pair. ...
Thesis
Full-text available
Le cloud computing, solution souple et peu couteuse, est aujourd'hui largement adopté pour la production à grande échelle de services IT. Toutefois, des utilisateurs malveillants tirent parti de ces caractéristiques pour bénéficier d'une plate-forme d'attaque prête à l'emploi dotée d'une puissance colossale. Parmi les plus grands bénéficiaires de cette conversion en vecteur d’attaque, les botclouds sont utilisés pour perpétrer des attaques de déni de service distribuées (DDoS) envers tout tiers connecté à Internet.Si les attaques de ce type, perpétrées par des botnets ont été largement étudiées par le passé, leur mode opératoire et leur contexte de mise en œuvre sont ici différents et nécessitent de nouvelles solutions. Pour ce faire, nous proposons dans le travail de thèse exposé dans ce manuscrit, une approche distribuée pour la détection à la source d'attaques DDoS perpétrées par des machines virtuelles hébergées dans un cloud public. Nous présentons tout d'abord une étude expérimentale qui a consisté à mettre en œuvre deux botclouds dans un environnement de déploiement quasi-réel hébergeant une charge légitime. L’analyse des données collectées permet de déduire des invariants comportementaux qui forment le socle d'un système de détection à base de signature, fondé sur une analyse en composantes principales. Enfin, pour satisfaire au support du facteur d'échelle, nous proposons une solution de distribution de notre détecteur sur la base d'un réseau de recouvrement pair à pair structuré qui forme une architecture hiérarchique d'agrégation décentralisée
Thesis
Full-text available
Mobile Ad hoc NETworks (MANET) are networks without infrastructure. The communication range among nodes is limited, where several hops are needed to transmit a packet from the source to the destination. These networks have a constantly changing topology due to its mobile nodes and their arbitrary connections, which make it vulnerable for diferent attacks. One of the most important attacks in MANET is the black hole attack which degrades the performance of the network by removing all the packets passing through it. There are several techniques for detecting black hole attacks in the ad hoc on demand vector protocol. In this thesis, a new approach based on AACK Adaptative ACKnowledgement is proposed. The proposed system is to detect the single and multiple black hole attacks by intrusion detection system with SPlitted AACK technique. The system is robust enough to detect all black hole attacks by using an iterative split of the main path until the detection of the malicious nodes. Network simulator 2 (NS2) is used for simulation. We tested our system on diferent networks with diferent network sizes and diferent numbers of attacks, and we compared our results with some existing intrusion detection system techniques. On the other hand a technique based on machine learning, more precisely on the random forest algorithm with the selection of the best features,is also proposed. The latter is tested on the NSL-KDD dataset. The results found were very satisfying in terms of Accuracy 99,66%, Precision 99,85 %, Recall 99,83 % and F1-Score 99,84%. Thus, the results have improved when compared with those of other techniques.
Article
A federation-based DIDS is a security platform composed of autonomous IDS able to learn with their data and cooperate with each other to improve the overall detection performance. However, evaluating the detection performance of a DIDS, specially considering its heterogeneous environment and the wide range of threats that emerge every single day, is not trivial. Although the Bayesian inference approach presents itself as a compatible option to model this kind of systems, lacking a sufficiently large and diverse dataset is a relevant issue for building blocks of prior knowledge. Our approach relies on the “learn-from-data” insight of the Beta function to propose a modeling framework aiming to assess the overall detection performance of DIDS systems, regardless of dataset rounds. Comparing our results to the numbers obtained either from testbeds or simulation, the proposed model presents a fair approximation.
Conference Paper
Full-text available
Conventional firewalls rely on topology restrictions and controlled network entry points to enforce traffic filtering. Furthermore, a firewall cannot filter traffic it does not see, so, effectively, every- one on the protected side is trusted. While this model has worked well for small to medium size networks, networking trends such as increased connectivity, higher line speeds, extranets, and telecom- muting threaten to make it obsolete. To address the shortcomings of traditional firewalls, the concept of a "distributed firewall" has been proposed. In this scheme, secu- rity policy is still centrally defined, but enforcement is left up to the individual endpoints. IPsec may be used to distribute credentials that express parts of the overall network policy. Alternately, these credentials may be obtained through out-of-band means. In this paper, we present the design and implementation of a distributed firewall using the KeyNote trust management system to specify, distribute, and resolve policy, and OpenBSD, an open source UNIX operating system.
Conference Paper
Full-text available
This paper presents Scribe, a large-scale event notification infrastructure for topic-based publish-subscribe applications. Scribe supports large numbers of topics, with a potentially large number of subscribers per topic. Scribe is built on top of Pastry, a generic peer-to-peer object location and routing substrate overlayed on the Internet, and leverages Pastry’s reliability, self-organization and locality properties. Pastry is used to create a topic (group) and to build an efficient multicast tree for the dissemination of events to the topic’s subscribers (members). Scribe provides weak reliability guarantees, but we outline how an application can extend Scribe to provide stronger ones.
Article
Article
Building very large computing systems is extremely challenging, given the lack of robust scalable communication technologies. This threatens a new generation of mission-critical but very large computing systems. Fortunately, a new generation of "gossip-based" or epidemic communication primitives can overcome a number of these scalability problems, offering robustness and reliability even in the most demanding settings. Epidemic protocols emulate the spread of an infection in a crowded population, and are both reliable and stable under forms of stress that will disable most traditional protocols. This paper describes some of the common problems that arise in scalable group communication systems and how epidemic techniques have been used to successfully address these problems.
Article
This paper describes a misuse detection system for Los Alamos National Laboratory's Integrated Computing Network (ICN). This automated expert system, the Network Anomaly Detection and Intrusion Reporter (NADIR), streamlines and supplements the manual audit record review traditionally performed by security auditors. NADIR compares network activity, as summarized in weekly profiles of individual users and the ICN as a whole, against expert rules that define security policy and improper or suspicious behaviour. NADIR reports suspicious behaviour to security auditors and provides tools to aid in follow-up investigations. This paper describes analysis by NADIR of two types of ICN activity: user authentication and access control, and mass file storage. It highlights system design issues of data handling, exploiting existing auditing systems, and performing audit analysis at the network level.
Conference Paper
This paper presents the design and evaluation of Pastry, a scalable, distributed object location and routing substrate for wide-area peer-to-peer applications. Pastry performs application-level routing and object location in a potentially very large overlay network of nodes connected via the Internet. It can be used to support a variety of peer-to-peer applications, including global data storage, data sharing, group communication and naming. Each node in the Pastry network has a unique identifier (nodeId). When presented with a message and a key, a Pastry node efficiently routes the message to the node with a nodeId that is numerically closest to the key, among all currently live Pastry nodes. Each Pastry node keeps track of its immediate neighbors in the nodeId space, and notifies applications of new node arrivals, node failures and recoveries. Pastry takes into account network locality; it seeks to minimize the distance messages travel, according to a to scalar proximity metric like the number of IP routing hops. Pastry is completely decentralized, scalable, and self-organizing; it automatically adapts to the arrival, departure and failure of nodes. Experimental results obtained with a prototype implementation on an emulated network of up to 100,000 nodes confirm Pastry’s scalability and efficiency, its ability to self-organize and adapt to node failures, and its good network locality properties.