Abstract
Cyber-physical systems (CPS) play an important role in our daily lives, such as automotive, medical monitoring, smart grid, industrial control systems and so on. CPS typically consists of three main components: sensors, aggregators and actuators. Recently, Software-Defined Networking (SDN) has been applied to CPS for achieving optimal resource allocation and Quality of Service, forming a type of SDN-assisted CPS. To protect such environment, collaborative intrusion detection system (CIDS) is a major security solution, but it is vulnerable to insider threat, where a cyber-attacker can behave maliciously within the network. In this work, we focus on this challenge and investigate the use of blockchain technology that can ensure immutable data sharing without the need of a trusted third party. We introduce a blockchain-enabled collaborative intrusion detection framework for SDN-assisted CPS. In particular, we use challenge-based CIDS in the study and evaluate the proposed framework under both external and internal attacks. The experimental results demonstrate the viability and effectiveness of our blockchain-enabled framework.









Similar content being viewed by others
Data availability
Data sharing not applicable to this article as no datasets were generated or analyzed during the current study.
References
Li, W., Tan, J., Wang, Y.: A framework of blockchain-based collaborative intrusion detection in software defined networking. The 14th international conference on network and system security (NSS), pp. 261-276 (2020)
Stergiopoulos, G., Dedousis, P., Gritzalis, D.: Automatic analysis of attack graphs for risk mitigation and prioritization on large-scale and complex networks in industry 4.0. Int. J. Inf. Sec. 21(1), 37–59 (2022)
Aceto, G., Persico, V., Pescape, A.: A survey on information and communication technologies for industry 4.0: state-of-the-art, taxonomies, perspectives, and challenges. IEEE Commun. Surv. Tutor. 21(4), 3467–3501 (2019)
Kocabas, O., Soyata, T., Aktas, M.K.: Emerging security mechanisms for medical cyber physical systems. IEEE ACM Trans. Comput. Biol. Bioinform. 13(3), 401–416 (2016)
Business Research Insights. Cyber physical system market size, share, growth, and industry growth. (accessed on 1 November 2022) https://www.businessresearchinsights.com/market-reports/cyber-physical-system-market-100757
Wu, J., Luo, S., Wang, S., Wang, H.: NLES: A Novel Lifetime Extension Scheme for Safety-Critical Cyber-Physical Systems Using SDN and NFV. IEEE Internet Things J. 6(2), 2463–2475 (2019)
Molina, E., Jacob, E.: Software-defined networking in cyber-physical systems: a survey. Comput. Electr. Eng. 66, 407–419 (2018)
Kathiravelu, P., Roy, P.V., Veiga, L.: SD-CPS: software-defined cyber-physical systems. Taming the challenges of CPS with workflows at the edge. Clust. Comput. 22(3), 661–677 (2019)
Sahay, R., Sepulveda, D.A., Meng, W., Jensen, C.D., Barfod, M.B.: CyberShip: An SDN-based autonomic attack mitigation framework for ship systems. In: Proceedings of SciSec, pp. 191-198 (2018)
Yaacoub, J.P.A., Salman, O., Noura, H.N., Kaaniche, N., Chehab, A., Malli, M.: Cyber-physical systems security: Limitations, issues and future trends. Microprocess Microsystems 77, 103201 (2020)
Lee, W., Cabrera, J.B.D., Thomas, A., Balwalli, N., Saluja, S., Zhang, Y.: Performance adaptation in real-time intrusion detection systems. RAID 2002, 252–273 (2002)
Meng, W., Li, W., Kwok, L.F.: EFM: enhancing the performance of signature-based network intrusion detection systems using enhanced filter mechanism. Comput. Secur. 43, 189–204 (2014)
Meng, W., Li, W., Kwok, L.F.: Design of intelligent KNN-based alarm filter using knowledge-based alert verification in intrusion detection. Secur. Commun. Netw. 8(18), 3883–3895 (2015)
Li, W., Wang, Y., Jin, Z., Yu, K., Li, J., Xiang, Y.: Challenge-based collaborative intrusion detection in software defined networking: an evaluation. Digit. Commun. Netw. 7, 257–263 (2021)
Sahay, R., Meng, W., Jensen, C.D.: The application of software defined networking on securing computer networks: a survey. J. Netw. Comput. Appl. 131, 89–108 (2019)
Liu, L., Yang, J., Meng, W.: Detecting malicious nodes via gradient descent and support vector machine in Internet of Things. Comput. Electr. Eng. 77, 339–353 (2019)
Li, W., Meng, W., Kwok, L.F.: SOOA: Exploring special On-Off attacks on challenge-based collaborative intrusion detection networks. In: proceedings of GPC, pp. 402-415 (2017)
Li, W., Meng, W., Kwok, L.F.: Investigating the influence of special on-off attacks on challenge-based collaborative intrusion detection networks. Future Internet 10(1), 1–16 (2018)
Li, W., Meng, W., Kwok, L.F., Ip, H.H.S.: PMFA: toward passive message fingerprint attacks on challenge-based collaborative intrusion detection networks. In: proceedings of NSS, pp. 433-449 (2016)
Li, W., Kwok, L.F.: Challenge-based Collaborative intrusion detection networks under passive message fingerprint attack: a further analysis. J. Inf. Secur. Appl. 47, 1–7 (2019)
Meng, W., Li, W., Jiang, L., Choo, K.K.R., Su, C.: Practical Bayesian poisoning attacks on challenge-based collaborative intrusion detection networks. In: proceedings of ESORICS, pp. 493-511 (2019)
Li, W., Meng, W., Kwok, L.F.: Surveying trust-based collaborative intrusion detection: state-of-the-art, challenges and future directions. IEEE Commun. Surv. Tutor. 24(1), 280–305 (2022)
Li, W., Meng, W., Liu, Z., Au, M.H.: Towards Blockchain-based software-defined networking: security challenges and solutions. IEICE Trans. Inf. Syst. 103(2), 196–203 (2020)
Alsmadi, I., Xu, D.: Security of software defined networks: a survey. Comput. Secur. 53, 79–108 (2015)
OpenFlow Switch Specification–Open networking foundation. https://www.opennetworking.org/wp-content/uploads/2014/10/openflow-switch-v1.5.1.pdf
Li, W., Meng, W., Kwok, L.F.: A survey on openflow-based software defined networks: security challenges and countermeasures. J. Netw. Comput. Appl. 68, 126–139 (2016)
Balzereit, K., Niggemann, O.: AutoConf: new algorithm for reconfiguration of cyber-physical production systems. IEEE Trans. Ind. Inf. 19(1), 739–749 (2023)
Meng, W., Wang, J., Wang, X., Liu, J.K., Yu, Z. Li, J., Zhao, Y., Chow, S.S.M.: Position paper on blockchain technology: smart contract and applications. In: proceedings of NSS, pp. 474-483 (2018)
Meng, W., Li, W., Zhu, L.: Enhancing medical smartphone networks via blockchain-based trust management against insider attacks. IEEE Trans. Eng. Manag. IEEE 67(4), 1377–1386 (2019)
Pirtle, C., Ehrenfeld, J.M.: Blockchain for healthcare: the next generation of medical records? J. Medical Syst. 42(9), 172:1-172:3 (2018)
Meng, W., Tischhauser, E.W., Wang, Q., Wang, Y., Han, J.: When intrusion detection meets blockchain technology: a review. IEEE Access. 6(1), 10179–10188 (2018)
Meng, W., Li, W., Yang, L.T., Li, P.: Enhancing challenge-based collaborative intrusion detection networks against insider attacks using blockchain. Int. J. Inf. Secur. 19, 279–290 (2020)
Mu, Y., Rezaeibagha, F., Huang, K.: Policy-driven blockchain and its applications for transport systems. IEEE Trans. Serv. Comput. 13(2), 230–240 (2020)
Chiu, W.Y., Meng, W., Jensen, C.D.: NoPKI - A point-to-point trusted third party service based on blockchain consensus algorithm. In: proceedings of the 3rd international conference on frontiers in cyber security (FCS), pp. 197-214 (2020)
Chiu, W.Y., Meng, W., Jensen, C.D.: My data, my control: a secure data sharing and access scheme over blockchain. J. Inf. Secur. Appl. 63, 103020 (2021)
Wüst, K., Gervais, A.: Do you need a blockchain? In: CVCBT, pp. 45-54 (2018)
Nakamoto, S.: Bitcoin: A peer-to-peer electronic cash system. http://bitcoin.org/bitcoin.pdf (2008)
Wood, G.: Ethereum: A secure decentralised generalised transaction ledger. EIP-150 Revision (2016)
Hyperledger: Open source blockchain technologies. https://www.hyperledger.org/
Wang, C., Zhang, Y., Chen, X., Liang, K., Wang, Z.: SDN-Based Handover Authentication Scheme for Mobile Edge Computing in Cyber-Physical Systems. IEEE Internet Things J. 6(5), 8692–8701 (2019)
Zainudin, Ahmad, Akter, Rubina, Kim, Dong-Seong, Lee, Jae-Min: Towards Lightweight Intrusion Identification in SDN-based Industrial Cyber-Physical Systems. In: Proceedings of APCC, pp. 610-614 (2022)
Latif, S.A., Wen, F.B.X., Iwendi, C., Wang, L.F., Mohsin, S.M., Han, Z., Band, S.S.: AI-empowered, blockchain and SDN integrated security architecture for IoT network of cyber physical systems. Comput. Commun. 181, 274–283 (2022)
Duma, C., Karresand, M., Shahmehri, N., Caronni, G.: A trust-aware, P2P-based overlay for intrusion detection. In: DEXA Workshop, pp. 692-697 (2006)
Li, W., Meng, W., Kwok, L.F.: Enhancing trust evaluation using intrusion sensitivity in collaborative intrusion detection networks: feasibility and challenges. In: proceedings of CIS, pp. 518-522 (2013)
Li, W., Meng, W., Kwok, L.F.: Design of intrusion sensitivity-based trust management model for collaborative intrusion detection networks. In: proceedings of IFIPTM, Springer, pp. 61-76 (2014)
Li, W., Meng, W.: Enhancing collaborative intrusion detection networks using intrusion sensitivity in detecting pollution attacks. Inf. Comput. Secur. 24(3), 265–276 (2016)
Veeraiah, N., Krishna, B.T.: Trust-aware FuzzyClus-Fuzzy NB: intrusion detection scheme based on fuzzy clustering and Bayesian rule. Wirel. Networks 25(7), 4021–4035 (2019)
Alexopoulos, N., Vasilomanolakis, E., Ivanko, N.R., Muhlhauser, M.: Towards blockchain-based collaborative intrusion detection systems. In: Proceedings of the 12th international conference on critical information infrastructures security, pp. 1-12 (2017)
Golomb, T., Mirsky, Y., Elovici, Y.: CIoTA: Collaborative IoT anomaly detection via blockchain. In: proceedings of workshop on decentralized IoT security and standards (DISS), pp. 1-6 (2018)
Li, W., Tug, S., Meng, W., Wang, Y.: Designing collaborative Blockchained signature-based intrusion detection in IoT environments. Future Generat. Comput. Syst. 96, 481–489 (2019)
Tug, S., Meng, W., Wang, X.: CBSigIDS: Towards collaborative blockchained signature-based intrusion detection. In: proceedings of The 1st IEEE international conference on blockchain (Blockchain) (2018)
Meng, W., Li, W., Tug, S., Tan, J.: Towards blockchain-enabled single character frequency-based exclusive signature matching in IoT-assisted smart cities. J. Parallel Distrib. Comput. 144, 268–277 (2020)
Hu, B., Zhou, C., Tian, Y.-C., Qin, Y., Junping, X.: A collaborative intrusion detection approach using blockchain for multimicrogrid systems. IEEE Trans. Syst. Man Cybern. Syst. 49(8), 1720–1730 (2019)
Kanth, V., McAbee, A., Tummala, M., McEachen, J.C.: Collaborative intrusion detection leveraging blockchain and pluggable authentication modules. In: proceedings of HICSS 1-7 (2020)
Lamb, C.C., Heileman, G.L.: Towards robust trust in software defined networks. GLOBECOM Workshops, pp. 166-171 (2014)
Yan, Z., Zhang, P., Vasilakos, A.V.: A security and trust framework for virtualized networks and software-defined networking. Security and Communication Networks 9(16), 3059–3069 (2016)
Meng, W., Raymond Choo, K.K., Furnell, S., Vasilakos, A.V., Probst, C.W.: Towards Bayesian-based trust management for insider attacks in healthcare software-defined networks. IEEE Trans. Netw. Service Manag. 15(2), 761–773 (2018)
Zhang, D., Yu, F.R., Yang, R., Tang, H.: A Deep Reinforcement Learning-based Trust Management Scheme for Software-defined Vehicular Networks. DIVANet@MSWiM, pp. 1-7 (2018)
Steichen, M.,. Hommes, S., State, R.: ChainGuard–A firewall for blockchain applications using SDN with OpenFlow. In: Proceedings of IPTComm, pp. 1-8 (2017)
Ujjan, R.M.A., Pervez, Z., Dahal, K.P.: Snort Based Collaborative Intrusion Detection System Using Blockchain in SDN. In: Proceedings of SKIMA, pp. 1-8 (2019)
Li, W., Wang, Y., Meng, W., Li, J., Su, C.: BlockCSDN: towards Blockchain-based collaborative intrusion detection in software defined networking. IEICE Trans. Inf. Syst. 105–D(2), 272–279 (2022)
Open vSwitch, an open virtual switch. http://openvswitch.org/ (Access on September 2022)
The POX Controller, https://github.com/noxrepo/pox/> (Access on October 2022)
Snort: An an open source network intrusion prevention and detection system (IDS/IPS). Homepage: http://www.snort.org/
NetScanTools. https://www.netscantools.com/nstpro_packet_generator.html. (Access on July 2022)
Chiu, W.Y., Meng, W.: BlockFW–towards blockchain-based rule-sharing firewall. In: The 16th SECURWARE, pp. 70-75 (2022)
Acknowledgements
This work was funded by the National Natural Science Foundation of China (NSFC) Grant No. 62102106.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
All authors declare that they have no conflict of interest.
Ethical approval
This article does not contain any studies with human participants or animals performed by any of the authors.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
A preliminary version of this paper has been presented at The 14th International Conference on Network and System Security (NSS), pp. 261–276, 2020 [1].
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Li, W., Wang, Y. & Li, J. A blockchain-enabled collaborative intrusion detection framework for SDN-assisted cyber-physical systems. Int. J. Inf. Secur. 22, 1219–1230 (2023). https://doi.org/10.1007/s10207-023-00687-x
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10207-023-00687-x