Skip to main content

Distributed Attack Prevention Using Dempster-Shafer Theory of Evidence

  • Conference paper
  • First Online:
Intelligent Computing Methodologies (ICIC 2017)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 10363))

Included in the following conference series:

Abstract

This paper details a robust collaborative intrusion detection methodology for detecting attacks within a Cloud federation. It is a proactive model and the responsibility for managing the elements of the Cloud is distributed among several monitoring nodes. Since there are a wide range of elements to manage, complexity grows proportionally with the size of the Cloud, so a suitable communication and monitoring hierarchy is adopted. Our architecture consists of four major entities: the Cloud Broker, the monitoring nodes, the local coordinator (Super Nodes), and the global coordinator (Command and Control server - C2). Utilising monitoring nodes into our architecture enhances the performance and response time, yet achieves higher accuracy and a broader spectrum of protection. For collaborative intrusion detection, we use the Dempster Shafer theory of evidence via the role of the Cloud Broker. Dempster Shafer executes as a main fusion node, with the role to collect and fuse the information provided by the monitors, taking the final decision regarding a possible attack.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Josang, A., Pope, S.: Dempster’s rule as seen by little coloured balls. Comput. Intell. 28(4), 453–474 (2012)

    Article  MathSciNet  MATH  Google Scholar 

  • MacDermott, Á., Shi, Q., Kifayat, K.: Collaborative intrusion detection in a federated Cloud environment using the Dempster-Shafer theory of evidence. In: European Conference on Information Warfare and Security, ECCWS (2015)

    Google Scholar 

  • MacDermott, Á., Shi, Q., Kifayat, K.: Collaborative intrusion detection in federated cloud environments. J. Comput. Sci. Appl. Big Data Anal. Intell. Syst. 3(3A), 10–20 (2015)

    Google Scholar 

  • Rak, M., Ficco, M., Luna, J., Ghani, H., Suri, N., Panica, S., Petcu, D.: Security issues in cloud federations. In: Achieving Federated and Self-Manageable Cloud Infrastructures: Theory and Practice, pp. 176–194 (2012). http://doi.org/10.4018/978-1-4666-1631-8.ch010

  • Ten, C.W., Manimaran, G., Liu, C.C.: Cybersecurity for critical infrastructures: attack and defense modeling. IEEE Trans. Syst. Man Cybern. Part A: Syst. Hum. 40(4), 853–865 (2010). http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5477189

  • Thomas, C., Narayanaswamy, B.: Sensor fusion for enhancement in intrusion detection. In: Sensor Fusion - Foundation and Applications, pp. 61–76 (2011)

    Google Scholar 

  • Trend Micro Incorporated.: Report on Cybersecurity and Critical Infrastructure in the Americas (2015)

    Google Scholar 

  • Xiao, Z., Xiao, Y.: Security and privacy in cloud computing. IEEE Commun. Surv. Tutor. 15(2), 843–859 (2013)

    Article  Google Scholar 

Download references

Acknowledgements

The work reported in this paper is partly supported under the Newton Research Collaboration Programme by the Royal Academy of Engineering.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Áine MacDermott .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

MacDermott, Á., Shi, Q., Kifayat, K. (2017). Distributed Attack Prevention Using Dempster-Shafer Theory of Evidence. In: Huang, DS., Hussain, A., Han, K., Gromiha, M. (eds) Intelligent Computing Methodologies. ICIC 2017. Lecture Notes in Computer Science(), vol 10363. Springer, Cham. https://doi.org/10.1007/978-3-319-63315-2_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-63315-2_18

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-63314-5

  • Online ISBN: 978-3-319-63315-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics