Paper Title
MIDS: A Decentralized, Multi-Intrusion Detection System

Over the past decade, information security has become a priority like no other. Due to no concrete method of monitoring what applications may be installed, unsuspecting users may inadvertently introduce vulnerabilities. Due to this oversight, malicious intruders can exploit the introduced vulnerabilities to mount any number of attacks. An example is a full Distributed Denial-of-Service (DDoS) attack which comprises of multi-step exploitation, vulnerability scanning, victimizing identified vulnerable virtual machines, converting them to zombies, and finally DDoS attacks through the victim machine s. Another example is a Man-in-the-Middle attack, where an attacker impersonates his/her victims before relaying independent messages, making it look like they are talking to each other. In lieu of this, we propose a decentralized, Multi- Intrusion Detection System (MIDS), which is built on an attack graph analytical model. Attack graphs depict ways in which an adversary can exploit vulnerabilities to break into a system. This will help us drastically improve attack detection and mitigate attack consequences. Keywords- Intrusion Detection System, Network, Security, Mul Ti-Intrusion, Attack Graph, DDoS, Man-in-the-Middl e