Distributed intrusion detection trust management through integrity and expertise evaluation

Information sharing and collaboration has facilitated decision accuracy and reaction time in many applications. Distributed Intrusion Detection Systems (DIDS) solutions are one of such applications that have dramatically been transformed. This is mainly due to increasing number of attacks as well as...

Full description

Saved in:
Bibliographic Details
Main Authors: KhorasaniZadeh, Hadi, Idris, Norbik Bashah, Ab. Manan, Jamalul-Lail
Format: Book Section
Published: IEEE 2012
Subjects:
Online Access:http://eprints.utm.my/id/eprint/35245/
http://dx.doi.org/10.1109/CyberSec.2012.6246102
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.utm.35245
record_format eprints
spelling my.utm.352452017-02-02T05:44:51Z http://eprints.utm.my/id/eprint/35245/ Distributed intrusion detection trust management through integrity and expertise evaluation KhorasaniZadeh, Hadi Idris, Norbik Bashah Ab. Manan, Jamalul-Lail QA75 Electronic computers. Computer science Information sharing and collaboration has facilitated decision accuracy and reaction time in many applications. Distributed Intrusion Detection Systems (DIDS) solutions are one of such applications that have dramatically been transformed. This is mainly due to increasing number of attacks as well as sophisticated nature of today's intrusions. Moreover, it has been shown that various critical components of a system can be targeted. This is further exasperated by the fact that most DIDS models do not consider attacks that targets the collaborative network itself. We specifically find this issue to be very critical and hence in this paper we propose a trust aware DIDS simulation model that is capable of categorizing each participating IDS expertise (i.e. speciality and competence), therefore helps collaborating organizations to consult our simulation model for choosing the right candidate for any type of intrusion. We call our proposed DIDS model Consultative Trusted Computing-based Collaborative IDS (CTC IDS). We utilize the Trusted Platform Module (TPM) for integrity evaluation and to fine-tune peer evaluation. IEEE 2012 Book Section PeerReviewed KhorasaniZadeh, Hadi and Idris, Norbik Bashah and Ab. Manan, Jamalul-Lail (2012) Distributed intrusion detection trust management through integrity and expertise evaluation. In: Proceedings 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012. IEEE, New York, pp. 133-138. ISBN 978-146731425-1 http://dx.doi.org/10.1109/CyberSec.2012.6246102 DOI:10.1109/CyberSec.2012.6246102
institution Universiti Teknologi Malaysia
building UTM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Teknologi Malaysia
content_source UTM Institutional Repository
url_provider http://eprints.utm.my/
topic QA75 Electronic computers. Computer science
spellingShingle QA75 Electronic computers. Computer science
KhorasaniZadeh, Hadi
Idris, Norbik Bashah
Ab. Manan, Jamalul-Lail
Distributed intrusion detection trust management through integrity and expertise evaluation
description Information sharing and collaboration has facilitated decision accuracy and reaction time in many applications. Distributed Intrusion Detection Systems (DIDS) solutions are one of such applications that have dramatically been transformed. This is mainly due to increasing number of attacks as well as sophisticated nature of today's intrusions. Moreover, it has been shown that various critical components of a system can be targeted. This is further exasperated by the fact that most DIDS models do not consider attacks that targets the collaborative network itself. We specifically find this issue to be very critical and hence in this paper we propose a trust aware DIDS simulation model that is capable of categorizing each participating IDS expertise (i.e. speciality and competence), therefore helps collaborating organizations to consult our simulation model for choosing the right candidate for any type of intrusion. We call our proposed DIDS model Consultative Trusted Computing-based Collaborative IDS (CTC IDS). We utilize the Trusted Platform Module (TPM) for integrity evaluation and to fine-tune peer evaluation.
format Book Section
author KhorasaniZadeh, Hadi
Idris, Norbik Bashah
Ab. Manan, Jamalul-Lail
author_facet KhorasaniZadeh, Hadi
Idris, Norbik Bashah
Ab. Manan, Jamalul-Lail
author_sort KhorasaniZadeh, Hadi
title Distributed intrusion detection trust management through integrity and expertise evaluation
title_short Distributed intrusion detection trust management through integrity and expertise evaluation
title_full Distributed intrusion detection trust management through integrity and expertise evaluation
title_fullStr Distributed intrusion detection trust management through integrity and expertise evaluation
title_full_unstemmed Distributed intrusion detection trust management through integrity and expertise evaluation
title_sort distributed intrusion detection trust management through integrity and expertise evaluation
publisher IEEE
publishDate 2012
url http://eprints.utm.my/id/eprint/35245/
http://dx.doi.org/10.1109/CyberSec.2012.6246102
_version_ 1643649805532004352
score 13.211869