Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Block Chain -Integrated IDS: A Decentralized Approach to Threat Detection and Logging

View through CrossRef
Nowadays, the propagation of cyber threats has increased in both scale and complexity, rendering Intrusion Detection Systems (IDS) a common target for evasive attacks. Historical IDS software frequently used a Great Wall of China approach that created central points of failure. In this paper, we propose a Block chain -enabled Intrusion Detection System (BIDS) which employs Block chain to improve security, transparency and resilience in the context of IDS frameworks. BIDS incorporates distributed ledger techniques for tamper-evident log storage, relies on smart contracts for automatic threat interceptions and adopts the Practical BFT (Practical Byzantine Fault Tolerance) consensus algorithm to provide efficient and verifiable event validation. To explore BIDS, we implement and evaluate it using the Suricata IDS, Hyperledger Fabric Block chain platform for authorization mechanisms, we use public intrusion datasets (CICIDS2017 and NSL-KDD) within a simulated enterprise network. From the empirical results, we prove that BIDS could provide detection accuracy as high as conventional IDS systems, yet substantially enhances the integrity of logs under abuse and recourse to log reading facilities: counter indication towards manipulation is more effective with less effort compared with OPSA, while it defeats all pre-inspection on assurance (see Sect. 4.5), due to structural alterations in data space and accommodation to incremental computation.
MDPI AG
Title: Block Chain -Integrated IDS: A Decentralized Approach to Threat Detection and Logging
Description:
Nowadays, the propagation of cyber threats has increased in both scale and complexity, rendering Intrusion Detection Systems (IDS) a common target for evasive attacks.
Historical IDS software frequently used a Great Wall of China approach that created central points of failure.
In this paper, we propose a Block chain -enabled Intrusion Detection System (BIDS) which employs Block chain to improve security, transparency and resilience in the context of IDS frameworks.
BIDS incorporates distributed ledger techniques for tamper-evident log storage, relies on smart contracts for automatic threat interceptions and adopts the Practical BFT (Practical Byzantine Fault Tolerance) consensus algorithm to provide efficient and verifiable event validation.
To explore BIDS, we implement and evaluate it using the Suricata IDS, Hyperledger Fabric Block chain platform for authorization mechanisms, we use public intrusion datasets (CICIDS2017 and NSL-KDD) within a simulated enterprise network.
From the empirical results, we prove that BIDS could provide detection accuracy as high as conventional IDS systems, yet substantially enhances the integrity of logs under abuse and recourse to log reading facilities: counter indication towards manipulation is more effective with less effort compared with OPSA, while it defeats all pre-inspection on assurance (see Sect.
4.
5), due to structural alterations in data space and accommodation to incremental computation.

Related Results

Mobile Agent (MA) Based Intrusion Detection Systems (IDS): A Systematic Review
Mobile Agent (MA) Based Intrusion Detection Systems (IDS): A Systematic Review
An Intrusion Detection System (IDS) identifies the attacks by analysing the events, considered undesirable from a security perspective, in systems and networks. It is necessary for...
ThreatBased Security Risk Evaluation in the Cloud
ThreatBased Security Risk Evaluation in the Cloud
Research ProblemCyber attacks are targeting the cloud computing systems, where enterprises, governments, and individuals are outsourcing their storage and computational resources f...
A Well Cementation Evaluation Method by the Azimuthal Gamma Combination With the Acoustic Logging in Horizontal Well
A Well Cementation Evaluation Method by the Azimuthal Gamma Combination With the Acoustic Logging in Horizontal Well
Horizontal well technology has been widely used in the exploration and development of unconventional oil and gas reservoirs to increase the exposed area of oil and gas reservoirs, ...
The Application of Multistage Geometric Analysis Method in Natural Fracture Identification
The Application of Multistage Geometric Analysis Method in Natural Fracture Identification
Abstract Imaging logging can intuitively recognize fractures around borehole walls. However, expensive cost of imaging logging limits its popularization, so littl...
Dhaka city water logging hazards: area identification and vulnerability assessment through GIS-remote sensing techniques
Dhaka city water logging hazards: area identification and vulnerability assessment through GIS-remote sensing techniques
AbstractWater logging is one of the most detrimental phenomena continuing to burden Dhaka dwellers. This study aims to spatio-temporarily identify the water logging hazard zones wi...
Image Restoration of Electrical Well Logging Based on Fourier Convolution
Image Restoration of Electrical Well Logging Based on Fourier Convolution
Imaging logging is an important technical means in logging evaluation of complex reservoirs. Through imaging logging, a two-dimensional image of the resistivity distribution around...
Research on the normalisation method of logging curves: taking XJ Oilfield as an example
Research on the normalisation method of logging curves: taking XJ Oilfield as an example
Abstract During the long-term exploration and development of the oilfield, it is difficult to ensure that all well logging curves are measured by the same type of in...

Back to Top