liu.seSearch for publications in DiVA
Change search
ReferencesLink to record
Permanent link

Direct link
A trust aware peer-to-peer based overlay architecture for intrusion detection
Linköping University, Department of Computer and Information Science. Linköping University, The Institute of Technology.
Swedish Defence Research Agency, Sweden.
Linköping University, Department of Computer and Information Science. Linköping University, The Institute of Technology.
Sun Microsystems Laboratories, USA.
Show others and affiliations
(English)Manuscript (preprint) (Other academic)
Abstract [en]

Traditional intrusion detection systems (IDS) are centralized and focused on protecting well bounded network regions. In contrast, current Internet attacks are highly distributed, spanning very large and dispersed regions of the Internet. This renders the deployed intrusion detection approaches inferior and limited in comparison to the attackers' capabilities. In this paper we propose a novel trust-aware peer-to-peer (P2P) based Overlay IDS architecture which is able tocoordinate and concert the detection capabilities of individual and formerly isolated IDSs, thereby increasing the overall effectiveness againstcurrent Internet attacks. The Overlay lDS is fully decentralized, thus avoiding the single point of failure problem characteristic to many other distributed lDS solutions. Moreover, we design an adaptive trust management mechanism which makes the Overlay IDS resilient to possible malicious peers infiltrating the overlay network. We have implemented our proposed Overlay lDS using JXTA P2P framework and we have evaluated its effectiveness for preventing the spread of a real Internet worm over an emulated network. As indicated by the evaluationresults, the use of our Overlay IDS significantly increases the overall survival rate of the network.

National Category
Engineering and Technology
URN: urn:nbn:se:liu:diva-86193OAI: diva2:575550
Available from: 2012-12-10 Created: 2012-12-10 Last updated: 2012-12-10
In thesis
1. Security and trust mechanisms for groups in distributed services
Open this publication in new window or tab >>Security and trust mechanisms for groups in distributed services
2005 (English)Doctoral thesis, comprehensive summary (Other academic)
Abstract [en]

Group communication is a fundamental paradigm in modem distributed services, with applications in domains such as content distribution, distributed games, and collaborative workspaces. Despite the increasing interest in group-based services and the latest developments in efficient and reliable multi cast, the secure management of groups remains a major challenge for group communication.

In this thesis we propose security and trust mechanisms for supporting secure management of groups within the contexts of controlled and of self-organizing settings.

Controlled groups occur in services, such as multi cast software delivery, where an authority exists that enforces a group membership policy. In this context we propose a secure group key management approach which assures that only authorized users can access protected group resources. In order to scale to large and dynamic groups, the key management scheme must also be efficient. However, security and efficiency are competing requirements. We address this issue by proposing two flexible group key management schemes which can be configured to best meet the security and efficiency requirements of applications and services. One of the schemes can also be dynamically tuned, at system runtime, to adapt to possible requirement changes.

Self-organizing groups occur in services, such as those enabled by peer-to-peer (P2P) and wireless technologies, which adopt a decentralized architecture. In the context of self-organizing groups, with no authority to dictate and control the group members' interactions, group members might behave maliciously and attempt to subvert other members in the group. We address this problem by proposing a reputation-based trust management approach that enables group members to distinguish between well-behaving and malicious members.

We have evaluated our group key management and trust mechanisms analytically and through simulation. The evaluation of the group key management schemes shows cost advantages for rekeying and key storage. The evaluation of the reputation-based trust management shows that our trust metric is resilient to group members maliciously changing their behavior and flexible in that it supports different types of trust dynamics. As a proof of concept, we have incorporated our trust mechanism into a P2P-based intrusion detection system. The test results show an increase in system resiliency to attacks.

Place, publisher, year, edition, pages
Linköping: Linköping University Electronic Press, 2005. 22 p.
Linköping Studies in Science and Technology. Dissertations, ISSN 0345-7524 ; 979
National Category
Computer Science
urn:nbn:se:liu:diva-30648 (URN)16243 (Local ID)91-85457-54-X (ISBN)16243 (Archive number)16243 (OAI)
Public defence
2005-11-09, Visionen, hus B, Campus Valla, Linköpings universitet, Linköping, 10:15 (English)
Available from: 2009-10-09 Created: 2009-10-09 Last updated: 2012-12-10Bibliographically approved

Open Access in DiVA

No full text

Search in DiVA

By author/editor
Duma, ClaudiuShahmehri, NahidTurcan, Eduard
By organisation
Department of Computer and Information ScienceThe Institute of Technology
Engineering and Technology

Search outside of DiVA

GoogleGoogle Scholar
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

Total: 85 hits
ReferencesLink to record
Permanent link

Direct link