Designing and Implementation of Blockchain-Based Collaborative Intrusion Detection System

Document Type : -

Author

Malik Ashtar University of Technology, Tehran, Iran

Abstract

Today, the number of cyberattacks on computer networks, especially local area networks and the Internet, has increased dramatically, and these attacks have become much more complex. Many intrusion detection systems (IDS) and signatures are being designed and developed to detect these types of attacks. In recent years, with the introduction of blockchain, which is a secure distributed database in decentralized networks, a dramatic change has occurred in computer networks. This technology can create consensus and trust between intrusion detection systems to increase the stability of the cooperating networks among IDS systems. Therefore, the combination of these two systems can have better performance than previous generations of IDS. Blockchain technology has many applications in the world of cryptography and network security due to features such as data integrity, availability, and decentralized management. Information security in this network is essential for the proper functioning of intrusion detection systems and firewalls. These features can be found in the Hyperledger Fabric network. Due to the use of asymmetric encryption and blockchain, this network transmits and records information securely and quickly in the network. In this project, using blockchain technology, we are trying to create a network of IDS nodes where each node can add its own rules to the blockchain database. In this way, the other nodes of the chain use the rules of other nodes to improve their intrusion detection system efficiency after consensus and synchronization. Also, due to the decentralized nature of the blockchain, a central identity control is not required to approve/disapprove the nodes and rules added to the database, and consensus mechanisms do this
.

Keywords

Main Subjects


Smiley face

] Nofer, M.; Gomber, P.; Hinz, O.; Schiereck, D. “Blockchain ”; BIS 2017, 59, 183-187.
[2] Gupta, S. “Blockchain”; IBM Online (http://www. IBM. COM), 2017.
[3] Zheng, Z.; Xie, S.; Dai, H. N.; Chen, X.; Wang, H. “Blockchain Challenges and Opportunities: A Survey”; Int. J. Web. Grid. Serv. 2018, 14, 352-375.
[4] Nakamoto, S. “Bitcoin P2P E-Cash Paper”; The Cryptography Mailing List, 2008.
[5] Franco, P. “Understanding Bitcoin”; Wiley, 2014.
[6] Hopwood, D.; Bowe, S.; Hornby, T.; Wilcox, N. “Zcash Protocol Specification”; GitHub: San Francisco, CA, USA, 2016.
[7] Wood, G. “Ethereum: A Secure Decentralised Generalised Transaction Ledger”; Ethereum Project Yellow Paper, 2014, 151, 1-32.
[8] Cachin, C. “Architecture of the Hyperledger Blockchain Fabric”; DCCL 2016, 310, 4.
[9] Androulaki, E.; Barger, A.; Bortnikov, V.; Cachin, C.; Christidis, K.; De Caro, A.; Yellick, J. ”Hyperledger Fabric: A Distributed Operating System for Permissioned Blockchains”; Proc. Thirteenth EuroSy  .Conf. 2018, 1-15.
[10] Olson, K.; Bowman, M.; Mitchell, J.; Amundson, S.; Middleton, D.; Montgomery, C. “Sawtooth: An Introduction”; The Linux Foundation, 2018.
[11] Dhillon, V.; Metcalf, D.; Hooper, M. “The Hyperledger Project”; Blockchain Enabled Applications, Apress, Berkeley, CA  2017, 139-149.
[12] Ashoor, A. S.; Gore, S. “Importance of Intrusion Detection System (IDS)”; J. Sci. Eng. Res. 2011, 2, 1–4.
[13] Sabahi, F.; Movaghar, A.; “Intrusion Detection: A Survey”; Third Int. Conf. Commun. Syst. Netw. 2008, 23–26.
[14] Caswell, B.; Beale, J. “Snort 2.1 Intrusion Detection”; Elsevier, 2004.
[15] Arboleda, A. F.; Bedón, C. E. “SnortTM Diagrams for Developers”; Universidad Del Cauca-Colombia, 2005.
[16] Ujjan, R. M. A.; Pervez, Z.; Dahal, K. “Snort Based Collaborative Intrusion Detection System Using Blockchain in SDN”; 13th Int. Con. Softw. Knowl. Inf. Manag. Appl. 2019, 1-8.
[17]      Alexopoulos, N.; Vasilomanolakis, E.; Ivánkó, N. R.; Mühlhäuser, M. “Towards Blockchain-Based Collaborative Intrusion Detection Systems”; Int. Con. Criti. Inf. Infrastruct. Secur. 2017, 107-118.
[18] Li, W.; Wang, Y.; Li, J.; Au, M. H. “Toward a Blockchain-Based Framework for Challenge-Based Collaborative Intrusion Detection”; Int. J. Inf. Secur. 2020, 1-13.
[19] Putra, G. D.; Dedeoglu, V.; Kanhere, S. S.; Jurdak, R. “Towards Scalable and Trustworthy Decentralized Collaborative Intrusion Detection System for IoT”; IEEE/ACM Fifth Int. Con. Internet-of-Things Des. and Implement 2020, 256-257.
[20] Meng, W.; Tischhauser, E. W.; Wang, Q.; Wang, Y.; Han, J. “When Intrusion Detection Meets Blockchain Technology: A Review”; IEEE Access 2018, 6, 10179-10188.