Detection workload in a dynamic grid-based intrusion detection environment

https://doi.org/10.1016/j.jpdc.2007.06.002Get rights and content

Abstract

Denial-of-service (DoS) and distributed denial-of-service (DDoS) are two of the most serious and destructive network threats on the Internet. Hackers, exploiting all kinds of malicious packages to attack and usurp network hosts, servers and bandwidth, have seriously damaged enterprise, campus and government network systems. Many network administrators employ intrusion detection systems (IDSs) and/or firewalls to protect their systems. However, some systems lose most of their detection and/or protection capabilities when encountering a huge volume of attack packets. In addition, some detection resources may fail due to hardware and/or software faults.

In this paper, we propose a Grid-based platform, named the dynamic grid-based intrusion detection environment (DGIDE), which exploits Grid's abundant computing resources to detect a massive amount of intrusion packets and to manage a dynamic environment. A detector, a node that detects attacks, can dynamically join or leave the DGIDE. A newly joined detector is tested so that we can obtain its key performance curves, which are used to balance detection workload among detectors. The DGIDE backs up network packets. When, for some reason, a detector cannot continue its detection thus leaving an unfinished detection task, the DGIDE allocates another available detector to take over. Therefore, the drawbacks of ordinary security systems as mentioned above can be avoided.

Section snippets

Fang-Yie Leu received his B.S., master and Ph.D. degrees all from National Taiwan University of Science and Technology, Taiwan, in 1983, 1986 and 1991, respectively, and another master degree from Knowledge System Institute, USA, in 1990. His research interests include wireless communication, network security, Grid applications and Chinese natural language processing. He is currently an associate professor of TungHai University, Taiwan, and director of database and network security laboratory

References (37)

  • E. Shmueli et al.

    Backfilling with lookahead to optimize the packing of parallel jobs

    J. Parallel Distributed Comput.

    (2005)
  • A. Adas, Traffic models in broadband networks, IEEE Comm. Mag. July 1997, pp....
  • R.K.C. Chang, Defending against flooding-based distributed denial-of-service attack: a tutorial, IEEE Comm. Mag. (2002)...
  • A.B. Downey et al.

    The elusive goal of workload characterization

    ACM SIGMETRICS Performance Evaluation Review

    (1999)
  • D.G. Feitelson, On the scalability of centralized control, In: Workshop on System Management Tools for Large-Scale...
  • I. Foster et al.

    The Grid: Blueprint for a New Computing Infrastructure

    (1999)
  • V.S. Frost, B. Melamed, Traffic modeling for telecommunications networks, IEEE Comm. Mag. March 1994, pp....
  • M. Gokhale, et.al., Granidt: towards gigabit rate network intrusion detection technology, Proceedings of the 12th...
  • D. Gross et al.

    Fundamentals of Queueing Theory

    (1998)
  • K. Ishibashi, et al., Measurement of DNS traffic caused by DDoS attack, Proceedings of the 2005 Symposium on...
  • L. Jin, W.Q. Tong, J.Q. Tang, B. Wang, A fault-tolerance mechanism in Grid, Proceedings of IEEE International...
  • L. Kleinrock, Queueing Systems, Theory, vol. 1, Wiley, New York,...
  • C. Kruegel, F. Valeur, G. Vigna, R. Kemmerer, Stateful intrusion detection for high-speed networks, Proceedings of the...
  • Least Squares,...
  • F.Y. Leu, J.C. Lin, M.C. Li, A real-time grid intrusion detection system, IEEE Trans. Dependable Secure Comput.,...
  • F.Y. Leu, J.C. Lin, M.C. Li, C.T. Yang, A performance-based grid intrusion detection system, Proceedings of IEEE Annual...
  • F.Y. Leu et al.

    Integrating grid with intrusion detection

    Proceedings of IEEE International Conference on Advanced Information Networking and Applications

    (2005)
  • F.Y. Leu, S.J. Yan, W.K. Chang, Fuzzy-based dynamic bandwidth allocation system, Proceedings of Fuzzy Systems and...
  • Cited by (13)

    • ENDMal: An anti-obfuscation and collaborative malware detection system using syscall sequences

      2013, Mathematical and Computer Modelling
      Citation Excerpt :

      In fact, malware is the cause of most Internet problems [2], such as spam e-mails and DoS (Denial of Service) attack [3]. There are many intrusion detection systems [4–6] trying to solve such malware-driven problems. However, with the development of malware obfuscation technologies and the exponentially increasing number of malware samples, it is becoming more difficult to defend against the new emerging malwares.

    • Improving reliability of a heterogeneous grid-based intrusion detection platform using levels of redundancies

      2010, Future Generation Computer Systems
      Citation Excerpt :

      TMR technique has been used in self-critical aircraft. In this paper, we propose a reliable heterogeneous Grid-based intrusion detection platform, named the Enhanced Dynamic Grid Intrusion Detection Environment (E-DGIDE), which is an extension of our previously developed system DGIDE [15]. The DGIDE exploits a Grid’s abundant computing resources to detect attacks and manage a dynamic environment.

    • Unified, Multi-level Intrusion Detection in Private Cloud Infrastructures

      2016, Proceedings - 2016 IEEE International Conference on Smart Cloud, SmartCloud 2016
    View all citing articles on Scopus

    Fang-Yie Leu received his B.S., master and Ph.D. degrees all from National Taiwan University of Science and Technology, Taiwan, in 1983, 1986 and 1991, respectively, and another master degree from Knowledge System Institute, USA, in 1990. His research interests include wireless communication, network security, Grid applications and Chinese natural language processing. He is currently an associate professor of TungHai University, Taiwan, and director of database and network security laboratory of the University. He is also a member of IEEE Computer Society.

    Ming-Chang Li is currently a Ph.D. student of Chiao Tung University, Hsinchu, Taiwan. He received his master degree in Computer Science and Information Engineering from Tunghai University, Taiwan, in 2006. His current research is on forensic technologies and security on wireless LAN.

    Jia-Chun Lin is currently a Ph.D. student of Chiao Tung University, Hsinchu, Taiwan. She received her master degree in Computer Science and Information Engineering from Tunghai University, Taiwan, in 2005. Her current research is on active defense and security in wireless LAN.

    Chao-Tung Yang received a BS degree in computer science and information engineering from Tunghai University, Taichung, Taiwan in 1990, and the M.S. degree in computer and information science from National Chiao Tung University, Hsinchu, Taiwan in 1992. He received the Ph.D. degree in computer and information science from National Chiao Tung University in July 1996. He won the 1996 Acer Dragon Award for outstanding Ph.D. Dissertation. He has worked as an associate researcher for ground operations in the ROCSAT Ground System Section (RGS) of the National Space Program Office (NSPO) in Hsinchu Science-based Industrial Park since 1996. In August 2001, he joined the faculty of the Department of Computer Science and Information Engineering at Tunghai University, where he is currently an associate professor. His researches have been sponsored by Taiwan agencies National Science Council (NSC), National Center for High Performance Computing (NCHC), and Ministry of Education. His present research interests are in grid and cluster computing, parallel and high-performance computing, and internet-based applications. He is both member of the IEEE Computer Society and ACM.

    View full text