Skip to main content
Book cover

EC2ND 2005 pp 197–206Cite as

Data Authentication and Trust Within Distributed Intrusion Detection System Inter-Component Communications

  • Conference paper

Abstract

Networks are a fundamental technology for users and businesses alike. In order to achieve security in ever-increasing distributed environments, recent advances in intrusion detection have led to the development of distributed intrusion detection systems (DIDS). A key concern in these systems is that inter-component communication of data regarding potential network intrusions must be authenticated. Thus, a level of trust is maintained within the distributed system that data has not been altered by a malicious intruder. This paper presents a novel scheme that provides security in the transmission of data between DIDS components. A key consideration in the provision of this security is that of the computational and network overhead that this data transfer incurs. Therefore, this paper presents a scheme that ensures the high level of trust required within DIDS, and as demonstrated by a case study, with minimal computational or network impact.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Kemmerer, R.A. & Vigna, G., “Intrusion Detection: A Brief History,” Computer, vol. 35, no. 4, pp. 27–30, 2002.

    Article  Google Scholar 

  2. Zhang, Y. & Paxson, V., “Detecting Backdoors,” in Proceedings of USENIX Security Symposium, Denver, CO, USA, 2000.

    Google Scholar 

  3. Ptacek, T.H. & Newsham, T.N., “Insertion, Evation, and Denial of Service: Eluding Network Intrusion Detection,” Secure Networks Inc. Technical Report, available from http:///www.clark.net/~roesch/idspaper.html, January 1998.

    Google Scholar 

  4. Hassler, V., Security Fundamentals for E-Commerce, Artech House, USA, 2001.

    Google Scholar 

  5. Rivest, R.L., Shamir, A. & Adelman, L.M., “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems,” Communications of the ACM, vol. 21, pp. 120–126, 1978.

    Article  MATH  Google Scholar 

  6. Rabin, M.O., Digital Signatures Foundations of Secure Communications, New York Acemic Press, NY, USA, 1978.

    Google Scholar 

  7. Asian, H.K., “A Hybrid Scheme for Multicast Authentication Over Lossy Networks,” Computers and Security, vol. 23, no.8, pp. 705–713, 2004.

    Article  Google Scholar 

  8. Dittman, J., Katzenbeisser, S., Schallart, C. & Veith, H. “Ensuring Media Integrity on Third Party Infrastructures,” in Sasaki, R., Qing, S., Okamoto, E. & Yoshiura, H. (eds.) Security and Privacy in the Age of Ubiquitous Computing, Springer/IFIP, NY, USA, 2005.

    Google Scholar 

  9. Challal, Y., Bettahar, H. & Bouabdallah, A., “SAKM: A Scalable and Adaptive Key Management Approach for Multicast Communications,” ACM SIGCOMM Computer Communications Review, vol. 32, no. 8, 2004.

    Google Scholar 

  10. Proctor, P.E., The Practical Intrusion Detection Handbook, Prentice Hall, Saddle River, NJ, USA, 2001.

    Google Scholar 

  11. Ning, P., Jajodia, S. & Wang, X.S., “Design and Implementation of a Decentralized Prototype System for Detecting Distributed Attacks,” Computer Communications, vol.25, pp. 1374–1391, 2002.

    Article  Google Scholar 

  12. Waldvogel, M., “GOSSIB vs. IP traceback Rumors,” in Proceedings of the Annual Computer Security Applications Conference (ACSAC), Las Vegas, NV, USA, 2002.

    Google Scholar 

  13. Haggerty, J., Berry, T., Shi, Q. & Merabti, M., “DiDDeM: A System for Early Detection of TCP SYN Flood Attacks,” in Proceedings of Globecom 04, Dallas, TX, USA, 2004.

    Google Scholar 

  14. Pfleeger, C.P. & Pfleeger, S.L., Security in Computing 3 rd ed., Prentice Hall, Upper Saddle River, NJ, USA, 2003.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag London Limited

About this paper

Cite this paper

Haggerty, J., Shi, Q., Fergus, P., Merabti, M. (2006). Data Authentication and Trust Within Distributed Intrusion Detection System Inter-Component Communications. In: Blyth, A. (eds) EC2ND 2005. Springer, London. https://doi.org/10.1007/1-84628-352-3_20

Download citation

  • DOI: https://doi.org/10.1007/1-84628-352-3_20

  • Publisher Name: Springer, London

  • Print ISBN: 978-1-84628-311-6

  • Online ISBN: 978-1-84628-352-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics