When intrusion detection meets blockchain technology: a review

W Meng, EW Tischhauser, Q Wang, Y Wang… - Ieee …, 2018 - ieeexplore.ieee.org
With the purpose of identifying cyber threats and possible incidents, intrusion detection
systems (IDSs) are widely deployed in various computer networks. In order to enhance the …

Surveying trust-based collaborative intrusion detection: state-of-the-art, challenges and future directions

W Li, W Meng, LF Kwok - IEEE Communications Surveys & …, 2021 - ieeexplore.ieee.org
Owing to the swift growth in cyber attacks, intrusion detection systems (IDSs) have become a
necessity to help safeguard personal and organizational assets. However, with the …

Enhancing collaborative intrusion detection via disagreement-based semi-supervised learning in IoT environments

W Li, W Meng, MH Au - Journal of Network and Computer Applications, 2020 - Elsevier
Collaborative intrusion detection systems (CIDSs) are develo** to improve the detection
performance of a single detector in Internet of Things (IoT) networks, through exchanging …

[PDF][PDF] A survey on honeypot software and data analysis

M Nawrocki, M Wählisch, TC Schmidt, C Keil… - arxiv preprint arxiv …, 2016 - arxiv.org
A Survey on Honeypot Software and Data Analysis Page 1 A Survey on Honeypot Software and
Data Analysis Marcin Nawrocki ∗ , Matthias Wählisch ∗ , Thomas C. Schmidt † , Christian Keil ‡ …

Systems and methods for correlating and distributing intrusion alert information among collaborating computer systems

SJ Stolfo, AD Keromytis, V Misra, ME Locasto… - US Patent …, 2014 - Google Patents
Systems and methods provide an alert correlator and an alert distributor that enable early
signs of an attack to be detected and rapidly disseminated to collaborating systems. The …

Very fast containment of scanning worms, revisited

N Weaver, S Staniford, V Paxson - Malware Detection, 2007 - Springer
Computer worms—malicious, self-propagating programs—represent a significant threat to
large networks. One possible defense, containment, seeks to limit a worm's spread by …

Collapsar: A VM-Based Architecture for Network Attack Detention Center.

X Jiang, D Xu - USENIX Security Symposium, 2004 - usenix.org
The honeypot has emerged as an effective tool to provide insights into new attacks and
current exploitation trends. Though effective, a single honeypot or multiple independently …

Enhancing collaborative intrusion detection networks against insider attacks using supervised intrusion sensitivity-based trust management model

W Li, W Meng, LF Kwok, HS Horace - Journal of Network and Computer …, 2017 - Elsevier
To defend against complex attacks, collaborative intrusion detection networks (CIDNs) have
been developed to enhance the detection accuracy, which enable an IDS to collect …

Detecting insider attacks in medical cyber–physical networks based on behavioral profiling

W Meng, W Li, Y Wang, MH Au - Future Generation Computer Systems, 2020 - Elsevier
Cyber–physical systems (CPS) have been widely used in medical domains to provide high-
quality patient treatment in complex clinical scenarios. With more medical devices being …

[HTML][HTML] Challenge-based collaborative intrusion detection in software-defined networking: an evaluation

W Li, Y Wang, Z **, K Yu, J Li, Y **ang - Digital Communications and …, 2021 - Elsevier
Abstract Software-Defined Networking (SDN) is an emerging architecture that enables a
computer network to be intelligently and centrally controlled via software applications. It can …