DocumentCode :
2283966
Title :
Relieving hot spots in collaborative intrusion detection systems during worm outbreaks
Author :
Zhou, Chenfeng Vincent ; Karunasekera, Shanika ; Leckie, Christopher
Author_Institution :
Dept. of Comput. Sci. & Software Eng., Univ. of Melbourne, Melbourne, VIC
fYear :
2008
fDate :
7-11 April 2008
Firstpage :
49
Lastpage :
56
Abstract :
The increasing number of stealthy and coordinated attacks on the Internet pose a significant threat to network security. Collaborative intrusion detection systems (CIDSs) have therefore been proposed to address this coordinated defense challenge by correlating patterns of suspicious activity based on the source addresses of the suspicious incoming traffic. However, during worm outbreaks, there can be a rapid growth in suspicious evidence that is reported about individual sources of the worm outbreak. In CIDSs that correlate suspicious activity by source address, the evidence relating to these worm spread sources can cause a load "hot-spot", which severely degrades the overall performance of the detection system. In this paper, we propose a load balancing scheme for a CIDS to evenly distribute the workload to avoid hot-spots during worm outbreaks. Rather than correlating suspicious evidence based on source addresses, we distribute the load in the CIDS using a scheme that enables different possible patterns of suspicious evidence to be automatically mapped onto different processing nodes in the CIDS. Simulation results show that our scheme can achieve significant improvements in load balancing without sacrificing detection accuracy.
Keywords :
Internet; groupware; invasive software; resource allocation; Internet; collaborative intrusion detection system; coordinated attacks; coordinated defense; detection accuracy; load balancing; load hot-spot; network security; source address; stealthy attacks; suspicious activity pattern; suspicious incoming traffic; workload distribution; worm outbreak; worm spread sources; Collaboration; Collaborative software; Computer architecture; Computer worms; Intrusion detection; Load management; Pattern analysis; Peer to peer computing; Scalability; Telecommunication traffic;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Network Operations and Management Symposium, 2008. NOMS 2008. IEEE
Conference_Location :
Salvador, Bahia
ISSN :
1542-1201
Print_ISBN :
978-1-4244-2065-0
Electronic_ISBN :
1542-1201
Type :
conf
DOI :
10.1109/NOMS.2008.4575116
Filename :
4575116
Link To Document :
بازگشت