Conclusion and future work
The major contribution of this work is the design of a novel framework that allows convenient distribution of intrusion detection tasks taking into account security requirements, variable availability of computing resources in personal and 515 enterprise computers, and additional capabilities coming from cloud services. In addition, the proposal integrates IDS projects built on diverse technologies and approaches, allowing modular re-use of established IDS techniques. As a derived result, the framework avoids a single point of failure or attack, by supporting multiple instances of the different tasks required for the overall IDS. The experiments show the feasibility of the approach, and provide insight into future work. The framework itself can evolve in different directions, listed below. From the scheduling point of view, two main problems have been identified, which can be explored further. First, considerable effort must be spent in order 525 to adapt and test existing techniques for flow scheduling on the proposed architecture; well-known and novel methods, algorithms and heuristics should be taken into account. Second, additional research is required to integrate existing predictive models, taking the most of their capabilities in order to increase the effectiveness of the scheduler component. 530 Another future work line has to do with the way in which optimum framework parameters are established: in addition to simulation aided estimation, adaptive behaviour could be added to the proposed framework, incorporating the results from advanced modelling techniques using, for example, neural networks. 535 System resilience is another interesting issue to work on. The framework supports a fallback policy, to be activated when central control is not available or accessible. This could be expanded by adding a service discovery mechanism, allowing devices to autonomously take suboptimal decisions based on local information coming from neighbour computers. 540 Finally, the experimental design should be completed, integrating other relevant factors, such as main memory usage, storage requirements and energy consumption.