Home // ICIMP 2012, The Seventh International Conference on Internet Monitoring and Protection // View article


Improving Attack Aggregation Methods Using Distributed Hash Tables

Authors:
Zoltán Czirkos
Márta Rencz
Gábor Hosszú

Keywords: collaborative intrusion detection; attack correlation; peer-to-peer; distributed hash table

Abstract:
Collaborative intrusion detection has several difficult subtasks to handle. Large amount of data generated by intrusion detection probes has to be handled to spot intrusions. Also when correlating the pieces of evidence, the connection between them has to be revealed as well, as it may be the case that they are part of a complex, large-scale attack. In this article, we present a peer-to-peer network based intrusion detection system, which is able to handle the intrusion detection data efficiently while maintaining the accuracy of centralized approaches of correlation. The system is built on a distributed hash table, for which keys are assigned to each piece of intrusion data in a preprocessing step. This method allows one to make well-known correlation mechanisms work in a distributed environment.

Pages: 82 to 87

Copyright: Copyright (c) IARIA, 2012

Publication date: May 27, 2012

Published in: conference

ISSN: 2308-3980

ISBN: 978-1-61208-201-1

Location: Stuttgart, Germany

Dates: from May 27, 2012 to June 1, 2012