-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathreport.tex
268 lines (184 loc) · 18 KB
/
report.tex
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
\documentclass[12pt]{report}
\usepackage{geometry}
\geometry{a4paper, left=2.0cm, right=2.0cm, top=2.0cm, bottom=2.0cm}
\usepackage{graphicx}
\usepackage[utf8]{inputenc}
\usepackage{subfigure}
\usepackage{amsmath}
\usepackage{float}
\usepackage[hidelinks]{hyperref}
\usepackage{listings}
\usepackage[usenames,dvipsnames]{color}
\usepackage{textcomp}
\usepackage{CJKutf8}
\renewcommand{\bibname}{References}
\usepackage[T1]{fontenc}
\usepackage{mathptmx}
\usepackage{url}
%\counterwithout{figure}{chapter}
\pagenumbering{roman}
\begin{document}
\begin{titlepage}
\begin{center}
\vspace*{2cm}
\Large
\textbf{Seminar Presentation Report} \\
\vspace{1.5cm}
Report About Journal Paper \cite{8274922} \\
When Intrusion Detection Meets Blockchain Technology: A Review
\vspace{1.5cm}
\begin{CJK*}{UTF8}{bsmi}
電機碩一 11278041 陳大荃
\end{CJK*}
\vfill
Department of Electrical Engineering\\
\vspace{0.2cm}
Chung Yuan Christian University\\
\vspace{0.2cm}
\date{\today}
\normalsize
\end{center}
\end{titlepage}
\tableofcontents
\listoffigures
%\listoftables
\chapter{Background Introduction}
\pagenumbering{arabic}
This journal paper introduced the general usages and techniques used for Intrusion Detection System (IDS) researches, list out the methology adopted in order to overcome computation that can't be performed with single IDS, mention the difficulties they face, possible solution with adopting blockchain technology, and its challenges and future developments. \\
In this report, background information about IDS and blockchain technologies will first be introduced in this chapter. Chapter 2 will explain how the proposed system integrates. Chapter 3 will list out challenges and research or development directions for IDS systems integrated with blockchain. \\
In this chapter, I will first introduce intrusion attacks mentioned in this paper, following with introduction of Intrusion Detection System (IDS), and lastly describe the technology of blockchain.
\section{Intrusion Attack}
Intrusion Attacks are attacks attempting to intrude target system to take secret information or disable certain functionality. Numerous risks intrusion attacks can cause includes corruption of data, financial loss for the organization, theft of data, operational disruption, and loss of reputation \cite{zenarmor_network_intrusion}. A lot of the following attacks focuses on the trust management system on peer-to-peer network of IDS.
\subsection{Betrayal Attack}
Intruder modify and alternate functionality of a trusted node to mislead the system. This can degrade the trust management system performance dramatically \cite{5188784}.
\subsection{Collusion Attack}
Intruder create/modify multiple nodes and making them into malicious ones. These nodes can cooperate together by providing false alert rankings in order to compromise the network. \cite{5188784} One example of such is passive message fingerprint attacks \cite{Li2016PMFATP}.
\subsection{Distributed Denial-of-Service Attack}
Distributed Denial-of-Service Attack (DDoS) in general is by using a horde of computers to send request too many for the target system to handle, making it unable to respond to legitimate request. As for NIDS/CIDS, intruder can manipulate lots of nodes to send large amount of request to paralyze its functionality.
\subsection{Newcomer Attack}
Intruder can use a malicious peer to register as a new user \cite{5188784}. New ID generated can prevent bad history recorded and can influence the trust management system.
\subsection{Sybil Attack}
Intruder modify a node to generate a large amount of fake identities to gain larger influence over the false ranking on others in the network \cite{5188784} \cite{10.1007/3-540-45748-8_24}.
\section{IDS}
Intrusion Detection System (IDS) \cite{NIST_IDPS} are deployed in many environmnets for minoring system status and sounds the alert when any anomaly situation happens in systems. Often IDSs are used to detect any malicious manipulation on system/program files intending to disable certain functionality or even paralyze it. Due to the attacks IDSs has to face can cause huge influence and distruction, the accuracy and response time becomes really crucial. Two major tasks IDS performs is information recording and alert generation. \\
On the other hand, if we implement more rules to check or increase the size of system too much, a single IDS unit can be overwhelmed and dramatically increase the response time. The lengthened response time makes attackers have enough time to cause damages to the system. Therefore people uses a group of IDSs to process and monitor a system to keep the detection latency down, called Collaborative Intrusion Detection System (CIDS) or Collaborative Intrusion Detection Network (CIDN). However, this makes proving the validity of each IDS very importent. If attackers can fake a IDS unit and mislead the decision of CIDS/CIDN, like insider attacks, then the system will no longer be functional. This paper focuses on the CIDS/CIDN validating/trusting issue and proposed to use blockchain as potential solution. \\
If we categorize IDS with deployed environment, they can be generally divided into Host-based IDS (HIDS) and Network-based IDS (NIDS), as shown in Fig \ref{fig:jf1}. \cite{McAfee_next_gen_IDS}\cite{wiki_IDS}\cite{wiki_HIDS} HIDS, originally targetting main frame computers, monitors dynamic behavior and the state of a computer system. NIDS, monitors and analysis passing traffic on the entire subnet. \\
\begin{figure}[H]
\centering
\includegraphics[width=1\textwidth]{../img/jf1.png}
\caption{Deploy environment of HIDS and NIDS. \cite{8274922}}
\label{fig:jf1}
\end{figure}
If we categorize with detection approaches, they can be divided into Signature-based IDS (SIDS) and Anomaly-based IDS (AIDS). \cite{wiki_IDS} SIDS looks for attacks by specific patters like network traffic byte sequences, file metadata, and process behavior. AIDS uses information from application and hardware to find anomaly acitivities in system. \\
If we groups a network of IDS together to enhance detection capability, they can be called Collaborative Intrusion Detection System (CIDS) or Collaborative Intrusion Detection Network (CIDN), as shown in Fig \ref{fig:jf2}.
\begin{figure}[H]
\centering
\includegraphics[width=1\textwidth]{../img/jf2.png}
\caption{Typical architecture of CIDS/CIDN. \cite{8274922}}
\label{fig:jf2}
\end{figure}
\subsection{HIDS}
HIDS executes on devices on the network and monitors inbound and outbound packets, takes snapshot of existing system files and matches with previous snapshot, and must more methods to detects security events. Once such events occurs, it can take immediate action to block certain process, stop network traffic, and notify administrator to perform further investigations.
\subsection{NIDS}
NIDS usually are deployed on network gateway to both monitor and collects information of all traffic comming through. With the deployed location privilege, it can monitors the entire subnet and protect them.
\subsection{SIDS}
SIDS is effective in detecting known exploits with information gathered from known attacks. However, this means its database needs to be constantly updated and populated with newest signatures. SIDS won't be effective on detecting unseen threats or variants of known threats.
\subsection{AIDS}
AIDS works by building a normal profile of the monitoring system. If any circumstances deviate from the normal profile, AIDS can classify it as an anomaly. The normal profile can be build statically and dynamically. However, building of these profile means we need the system to be in a stable state, which can be difficult for some systems which perform lots of actions whenever being triggered.
\subsection{CIDSs/CIDNs}
If a single IDS isn't sufficient for the target system, we can combine multiple IDS to become CIDS/CIDN. These IDS networks can spreads the computation load to multiple devices and gather a lot more information from the target protecting system. Ideally this can decrease computation needed for each individual IDS and decrease detection latency for large systems. However, as the originally singla unit being split into multiple different units, this makes CIDS/CIDN vulnerable to attacks like Dos or DDoS, insider attacks, betrayal attacks and such. Basically, attacker can bring down CIDS/CIDN by overloading its network communication, or can fake the communication between individual units making attacks possible. \\
Traditionally collaboration system can be divided into following three categories:
\begin{enumerate}
\item{Hierarchical collaboration system}: These systems puts the role of decision maker to a single unit, centralized trusted server. Like EMERALD \cite{emerald-niss97} and DIDS \cite{Snapp1997DIDSI}.
\item{Subscribe collaboration system}: These systems subscribes to other intrusion detection systems online as backbone to obtain latest info on new attacks. Like COSSACK \cite{COSSACK} and DOMINO \cite{DOMINO}.
\item{Peer-to-peer (P2P) query-based system}: Each individual nodes request data (trust related info) with each other. Like Netbait \cite{Netbait} and PIER \cite{PIER}.
\end{enumerate}
\section{Blockchain}
Blockchain technology is the backbone of all of the cryptocurrencies. Its decentralized nature makes it works great with peer-to-peer network. Each node in the network will have a copy of the chain, and the overall confirmed result (transaction) is generated based on what majority of the chains records. The schematic of blockchain is shown in Figure \ref{fig:jf3}. \\
\begin{figure}[H]
\centering
\includegraphics[width=1\textwidth]{../img/jf3.png}
\caption{Schematic view of a blockchain. \cite{8274922}}
\label{fig:jf3}
\end{figure}
One of the downside of blockchain for maintaining its trust is to keep the entire chain of transaction record starting from the genesis block. If a lot of transactions are written into the chain, it will create a gigantic file for each and every nodes. To overcome this issue, individual transactions can be hashed by Merkle tree \cite{6233691} \cite{Bayer1993ImprovingTE}, as shown in Figure \ref{fig:jf4}.
\begin{figure}[H]
\centering
\includegraphics[width=1\textwidth]{../img/jf4.png}
\caption{Compact representation of Merkle tree. \cite{8274922}}
\label{fig:jf4}
\end{figure}
\subsection{Permissionless Blockchains}
This category of blockchain does not limit read and write permission at all. Anyone connected to the network will be able to have full access to the entire chain. This type of blockchain is usually used for services available for public and can be validate whenever needed. Famous example using this technology is Bitcoin and ethereum.
\subsection{Permissioned Blockchains}
This category of blockchain limits write permission to all users (nodes) in the network. Furthermore, with restriction to read permission, it can be subdivided into public permissioned blockchains and private permissioned blockchains. These types of blockchains is often used within private organization to leverage its safety nature if multiple ones in network exists. Famous usage of this technology is hyperledger.
\subsection{Consensus Protocols}
The following three protocols enables the blockchain to function.
\begin{enumerate}
\item{Proof of Work}: This enforce a nodes to spend considerable resources to solve a puzzle. For field of IDS, this can be used to perform computation to detect attacks.
\item{Proof of Stake}: Stake, is how much influence a single node can have. This protocol allows nodes with higher stake to have more influence on the network.
\item{Proof of Elapsed Time}: The more resource a node has, the more it can contribute to the network. This protocol allows nodes with more resource to have more influence on the network.
\end{enumerate}
\chapter{IDS with Blockchain}
In this chapter, we will first discuss what challenges the Collaborative Intrusion Detection (CIS) technology is facing, then we will discuss how blockchain can be used to overcome these challenges.
\section{Challenges in CID}
Two major challenges are listed by the authors of this paper despite this field has been studied for nearly 40 years at the time of writing.
\subsection{Data sharing}
Real world scenario or environment is essential for developing such CID technology and continue to improve it. However, due to the nature of the field, these CIDN/CIDS usually guards data that needs to have up most privacy to private entities. One the other hand, both parties in CID technology development and environment provider might not be able to trust each other for security reason. Without the environment and data, optimization of detection algorithms can be hardly applicable in real world scenario.
\subsection{Trust management}
With the researches done in this domain, trust management system accross the entire network is often used to determine the trustworthiness of a node. With the need of a absolute trusted node, in practice, it is usually implemented with a centralized server. This makes the network having a single point of failure, and can be disabled with attacks focusing the centralized trusted server.
\section{Blockchain-based solutions}
Blockchain can be implemented in peer-to-peer network without the need for a absolute trusted node. It also makes attacking single node in the network have a lot less significant affect, since the majority of the nodes needs to be modified to be able to change the overall record recorded on blockchain network.
\subsection{Data Privacy}
With blockchain technology, it is possible to share nearly no information when performing transaction. No IP addresses and packet payloads needs to be recorded. Also, both parties can have certain agreement on data-sharing or storaging to manipulate the data before transmittion, making only the two parties can have access to the data.
\subsection{Trust Computation}
Alert exchange in CIDN/CIDS is extreme importent, helping the decision of anomaly. These alerts can be regarded as transaction and stored on blockchain to leverage benefits blockchains provide.
\section{Scope of Application for Blockchains}
Devide with read and write permission limitation, blockchain can be divided into permissionless and permissioned blockchains. Researchers have proposed a decision schematic \cite{8525392} for different use cases as shwon in Figure \ref{fig:jf5}.
\begin{figure}[H]
\centering
\includegraphics[width=1\textwidth]{../img/jf5.png}
\caption{Schematic blockchain type decision diagram. \cite{8274922}}
\label{fig:jf5}
\end{figure}
%\addtocontents{toc}{\protect\newpage} % Add page break in a "Chapter" entry in ToC
\chapter{Challenges and Future Trends}
In this chapter, we will discuss the challenges and trends of adopting blockchain technology in CIDN/CIDS.
\begin{figure}[H]
\centering
\includegraphics[width=0.8\textwidth]{../img/jf6.png}
\caption{Challenges and limitations of blockchain technology. \cite{8274922}}
\label{fig:jf6}
\end{figure}
\section{Challenges and Limitations}
Blockchain technology can be used to solve some of the challenges CIDN/CIDS faces, but it also brings new challenges and limitation due to its nature.
\subsection{Overhead Traffic with Limited Handling Capability}
Since blockchain works with huge amount of data exchanging, the increased network traffic can overload a IDS node computation capability.
\subsection{Limited Signature Coverage}
For signature-based detection methods, newest and most accurate signatures are essential for good detection result. This means the detection performance is still limited to the number and quality of deployed signatures. These signature, however, can be hard to acquire.
\subsection{Inaccurate Profile Establishment}
For anomaly-based detection methods, the difficulty of creating accurate normal and abnormal profiles is still a challenge, and is not solved by blockchain technology.
\subsection{Massive False Alerts}
If the detection algorithm is not well designed and implemented, large amount of false alerts can be generated. This can become a huge burden for security analysts to frequently inspect the system for any anomaly.
\subsection{Energy and Cost}
Just like other services created with blockchain (like cryptocurrencies), the energy and cost consumption is still a huge problem. This is due to the nature of blockchain, where a lot of computation is needed to maintain the network.
\subsection{Security and Privacy}
Smart transactions used for many existing blockchain-related applications may leak sensitive information. Also, since the blockchain heavily relies on the network, it can be attacked with DDoS without manipulating algorithms.
\subsection{Latency and Complexity}
Since blockchain is decentralized, it might takes hours for the entire network to update the chain. This can be a problem for real-time applications, like IDS.
\subsection{Awareneess and Adoption}
Awareness of the blockchain technology is the key for adoption in the field of IDS. However, many people are still short of understanding of the technology.
\subsection{Organization and Size}
If the size of the network grows larger, it can degrades the performance of blockchain technology.
\subsection{Regulations and Management}
Since blockchain is a new technology, there are no regulations and management for it. Organizations might bypass some of the regulations for better efficiency, making blockchain application works in unideal situation.
\section{Future Directions}
With the development of blockchain technology, it is possible to overcome some of the challenges and limitations listed above. Below are the the major applications this technology can be helpful.
\begin{enumerate}
\item{Data Sharing}: Blockchain is suitable for handeling event logging and transaction processing. It has great potential when performance and data privacy is improved.
\item{Alert Exchange}: Just like data sharing, alerts can be recorded on blockchain to leverage its benefits.
\item{Trust Computation}: With alert exchange recorded on blockchain, trust computation can be performed based on these records to determine the trustworthiness of a node.
\end{enumerate}
\bibliography{report}
\bibliographystyle{unsrt}
\end{document}