A Privacy-Preserving Framework for Collaborative Intrusion Detection Networks Through Fog Computing

Yu Wang, Lin Xie, Wenjuan Li, Weizhi Meng*, Jin Li

*Corresponding author for this work

Research output: Journal Publications and ReviewsRGC 21 - Publication in refereed journalpeer-review

Abstract

Nowadays, cyber threats (e.g., intrusions) are distributed across various networks with the dispersed networking resources. Intrusion detection systems (IDSs) have already become an essential solution to defend against a large amount of attacks. With the development of cloud computing, a modern IDS is able to implement more complicated detection algorithms by offloading the expensive operations such as the process of signature matching to the cloud (i.e., utilizing computing resources from the cloud). However, during the detection process, no party wants to disclose their own data especially sensitive information to others for privacy concerns, even to the cloud side. For this sake, privacy-preserving technology has been applied to IDSs, while it still lacks of proper solutions for a collaborative intrusion detection network (CIDN) due to geographical distribution. A CIDN enables a set of dispersed IDS nodes to exchange required information. With the advent of fog computing, in this paper, we propose a privacy-preserving framework for collaborative networks based on fog devices. Our study shows that the proposed framework can help reduce the workload on cloud’s side.
Original languageEnglish
Pages (from-to)267-279
JournalLecture Notes in Computer Science
Volume10581
DOIs
Publication statusPublished - Oct 2017
Event9th International Symposium on Cyberspace Safety and Security(CSS 2017) - Xi'an, China
Duration: 23 Oct 201725 Oct 2017

Research Keywords

  • Cloud environment
  • Collaborate network
  • Fog computing
  • Intrusion detection
  • Privacy preserving

Fingerprint

Dive into the research topics of 'A Privacy-Preserving Framework for Collaborative Intrusion Detection Networks Through Fog Computing'. Together they form a unique fingerprint.

Cite this