Usage of Broadcast Messaging in a Distributed Hash Table for Intrusion Detection

Author(s):  
Zoltán Czirkos ◽  
Gábor Hosszú

In this chapter, the authors present a novel peer-to-peer based intrusion detection system called Komondor, more specifically, its internals regarding the utilized peer-to-peer transport layer. The novelty of our intrusion detection system is that it is composed of independent software instances running on different hosts and is organized into a peer-to-peer network. The maintenance of this overlay network does not require any user interaction. The applied P2P overlay network model enables the nodes to communicate evenly over an unstable network. The base of our Komondor NIDS is a P2P network similar to Kademlia. To achieve high reliability and availability, we had to modify the Kademlia overlay network in such a way so that it would be resistent to network failures and support broadcast messages. The main purpose of this chapter is to present our modifications and enhancements on Kademlia.

2003 ◽  
Vol 13 (04) ◽  
pp. 643-657 ◽  
Author(s):  
L. GARCÉS-ERICE ◽  
E. W. BIERSACK ◽  
K. W. ROSS ◽  
P. A. FELBER ◽  
G. URVOY-KELLER

Structured peer-to-peer (P2P) lookup services organize peers into a flat overlay network and offer distributed hash table (DHT) functionality. Data is associated with keys and each peer is responsible for a subset of the keys. In hierarchical DHTs, peers are organized into groups, and each group has its autonomous intra-group overlay network and lookup service. Groups are organized in a top-level overlay network. To find a peer that is responsible for a key, the top-level overlay first determines the group responsible for the key; the responsible group then uses its intra-group overlay to determine the specific peer that is responsible for the key. We provide a general framework for hierarchical DHTs with scalable overlay management. We specifically study a two-tier hierarchy that uses Chord for the top level. Our analysis shows that by using the most reliable peers in the top level, the hierarchical design significantly reduces the expected number of hops. We also present a method to construct hierarchical DHTs that map well to the Internet topology and achieve short intra-group communication delay. The results demonstrate the feasibility of locality-based peer groups, which allow P2P systems to take full advantage of the hierarchical design.


Author(s):  
K. Raja, Et. al.

The objective of this paper is to identify the intruder of the wireless local area network based on the network and transport layer while accessing the internet within organizations and industries. The Intrusion detection system is the security that attempts to identify anomalies attributes who are trying to misuse a network without authorization and those who have legitimate access to the system but are abusing their privileges. The fact of the existing system deals with a firewall to protect and detect the unauthorized person using Wireless Local Area Network. Since the administrator may block or unblock the intruder based on the priority. This paper presents an enhanced framework, to detect and monitor the anomalies in the wireless sensor networks in an organization or an institution. The proposed approach to detect and filter the intruder in the wireless local area networks. Hence optimize the intrusion detection system in the particular organization or industries. The proposed IDS results are compared with the existing Decision Tree, Naive Bayes, and Random Forest algorithms.


Electronics ◽  
2020 ◽  
Vol 9 (7) ◽  
pp. 1120 ◽  
Author(s):  
Chao Liang ◽  
Bharanidharan Shanmugam ◽  
Sami Azam ◽  
Asif Karim ◽  
Ashraful Islam ◽  
...  

With the popularity of Internet of Things (IoT) technology, the security of the IoT network has become an important issue. Traditional intrusion detection systems have their limitations when applied to the IoT network due to resource constraints and the complexity. This research focusses on the design, implementation and testing of an intrusion detection system which uses a hybrid placement strategy based on a multi-agent system, blockchain and deep learning algorithms. The system consists of the following modules: data collection, data management, analysis, and response. The National security lab–knowledge discovery and data mining NSL-KDD dataset is used to test the system. The results demonstrate the efficiency of deep learning algorithms when detecting attacks from the transport layer. The experiment indicates that deep learning algorithms are suitable for intrusion detection in IoT network environment.


Sign in / Sign up

Export Citation Format

Share Document