Next Article in Journal
Acknowledgement to Reviewers of Future Internet in 2017
Next Article in Special Issue
Push Attack: Binding Virtual and Real Identities Using Mobile Push Notifications
Previous Article in Journal
Elastic Scheduling of Scientific Workflows under Deadline Constraints in Cloud Computing Environments
Previous Article in Special Issue
An Anonymous Offline RFID Grouping-Proof Protocol
Article Menu
Issue 1 (January) cover image

Export Article

Open AccessFeature PaperArticle
Future Internet 2018, 10(1), 6; https://doi.org/10.3390/fi10010006

Investigating the Influence of Special On–Off Attacks on Challenge-Based Collaborative Intrusion Detection Networks

1
Department of Computer Science, City University of Hong Kong, Hong Kong, China
2
Department of Applied Mathematics and Computer Science, Technical University of Denmark, 2800 Kongens Lyngby, Denmark
A preliminary version of this paper has been presented at the 12th International Conference on Green, Pervasive, and Cloud Computing (GPC), 2017; pp. 402–415.
*
Author to whom correspondence should be addressed.
Received: 15 December 2017 / Revised: 2 January 2018 / Accepted: 3 January 2018 / Published: 8 January 2018
(This article belongs to the Special Issue Security and Privacy in Wireless and Mobile Networks)
View Full-Text   |   Download PDF [529 KB, uploaded 8 January 2018]   |  

Abstract

Intrusions are becoming more complicated with the recent development of adversarial techniques. To boost the detection accuracy of a separate intrusion detector, the collaborative intrusion detection network (CIDN) has thus been developed by allowing intrusion detection system (IDS) nodes to exchange data with each other. Insider attacks are a great threat for such types of collaborative networks, where an attacker has the authorized access within the network. In literature, a challenge-based trust mechanism is effective at identifying malicious nodes by sending challenges. However, such mechanisms are heavily dependent on two assumptions, which would cause CIDNs to be vulnerable to advanced insider attacks in practice. In this work, we investigate the influence of advanced on–off attacks on challenge-based CIDNs, which can respond truthfully to one IDS node but behave maliciously to another IDS node. To evaluate the attack performance, we have conducted two experiments under a simulated and a real CIDN environment. The obtained results demonstrate that our designed attack is able to compromise the robustness of challenge-based CIDNs in practice; that is, some malicious nodes can behave untruthfully without a timely detection. View Full-Text
Keywords: intrusion detection; collaborative network; on–off attack; challenge-based mechanism; trust computation and management intrusion detection; collaborative network; on–off attack; challenge-based mechanism; trust computation and management
Figures

Figure 1

This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. (CC BY 4.0).
SciFeed

Share & Cite This Article

MDPI and ACS Style

Li, W.; Meng, W.; Kwok, L.F. Investigating the Influence of Special On–Off Attacks on Challenge-Based Collaborative Intrusion Detection Networks. Future Internet 2018, 10, 6.

Show more citation formats Show less citations formats

Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Related Articles

Article Metrics

Article Access Statistics

1

Comments

[Return to top]
Future Internet EISSN 1999-5903 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top