Intrusion detection systems (IDS) support the recognition of attacks, based on the analysis of data coming from either network data (Network-based IDS) or, in alternative, from logs stored in a host (Host-based IDS). Exploiting heterogeneous data coming from both kinds of sources could be useful to detect coordinated attacks and to reduce the number of false alarms, but poses challenges in terms of both information integration and scalability. In order to foster the development of such a hybrid IDS, we here propose a p2p intrusion detection architecture, which combines different data manipulation/mining techniques and a collaborative ensemble-based learning approach, and al- lows to incrementally classify attacks by integrating information extracted from both network-traffic data and host logs. Preliminary experiments, conducted on real-life dataset, show that the approach is promising.

A peer-to-peer architecture for detecting attacks from network traffic and log data

Francesco Folino;Gianluigi Folino;Luigi Pontieri;Pietro Sabatino
2017

Abstract

Intrusion detection systems (IDS) support the recognition of attacks, based on the analysis of data coming from either network data (Network-based IDS) or, in alternative, from logs stored in a host (Host-based IDS). Exploiting heterogeneous data coming from both kinds of sources could be useful to detect coordinated attacks and to reduce the number of false alarms, but poses challenges in terms of both information integration and scalability. In order to foster the development of such a hybrid IDS, we here propose a p2p intrusion detection architecture, which combines different data manipulation/mining techniques and a collaborative ensemble-based learning approach, and al- lows to incrementally classify attacks by integrating information extracted from both network-traffic data and host logs. Preliminary experiments, conducted on real-life dataset, show that the approach is promising.
2017
Istituto di Calcolo e Reti ad Alte Prestazioni - ICAR
Intrusion Detection Systems
Network Intrusion Detection Systems
Ensemble-based Intrusion Detection Systems
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/20.500.14243/332464
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus ND
  • ???jsp.display-item.citation.isi??? ND
social impact