When intrusion detection meets blockchain technology: a review
With the purpose of identifying cyber threats and possible incidents, intrusion detection
systems (IDSs) are widely deployed in various computer networks. In order to enhance the …
systems (IDSs) are widely deployed in various computer networks. In order to enhance the …
Surveying trust-based collaborative intrusion detection: state-of-the-art, challenges and future directions
Owing to the swift growth in cyber attacks, intrusion detection systems (IDSs) have become a
necessity to help safeguard personal and organizational assets. However, with the …
necessity to help safeguard personal and organizational assets. However, with the …
Enhancing collaborative intrusion detection via disagreement-based semi-supervised learning in IoT environments
Collaborative intrusion detection systems (CIDSs) are develo** to improve the detection
performance of a single detector in Internet of Things (IoT) networks, through exchanging …
performance of a single detector in Internet of Things (IoT) networks, through exchanging …
[PDF][PDF] A survey on honeypot software and data analysis
A Survey on Honeypot Software and Data Analysis Page 1 A Survey on Honeypot Software and
Data Analysis Marcin Nawrocki ∗ , Matthias Wählisch ∗ , Thomas C. Schmidt † , Christian Keil ‡ …
Data Analysis Marcin Nawrocki ∗ , Matthias Wählisch ∗ , Thomas C. Schmidt † , Christian Keil ‡ …
Systems and methods for correlating and distributing intrusion alert information among collaborating computer systems
Systems and methods provide an alert correlator and an alert distributor that enable early
signs of an attack to be detected and rapidly disseminated to collaborating systems. The …
signs of an attack to be detected and rapidly disseminated to collaborating systems. The …
Very fast containment of scanning worms, revisited
Computer worms—malicious, self-propagating programs—represent a significant threat to
large networks. One possible defense, containment, seeks to limit a worm's spread by …
large networks. One possible defense, containment, seeks to limit a worm's spread by …
Collapsar: A VM-Based Architecture for Network Attack Detention Center.
The honeypot has emerged as an effective tool to provide insights into new attacks and
current exploitation trends. Though effective, a single honeypot or multiple independently …
current exploitation trends. Though effective, a single honeypot or multiple independently …
Enhancing collaborative intrusion detection networks against insider attacks using supervised intrusion sensitivity-based trust management model
To defend against complex attacks, collaborative intrusion detection networks (CIDNs) have
been developed to enhance the detection accuracy, which enable an IDS to collect …
been developed to enhance the detection accuracy, which enable an IDS to collect …
Detecting insider attacks in medical cyber–physical networks based on behavioral profiling
Cyber–physical systems (CPS) have been widely used in medical domains to provide high-
quality patient treatment in complex clinical scenarios. With more medical devices being …
quality patient treatment in complex clinical scenarios. With more medical devices being …
[HTML][HTML] Challenge-based collaborative intrusion detection in software-defined networking: an evaluation
W Li, Y Wang, Z **, K Yu, J Li, Y **ang - Digital Communications and …, 2021 - Elsevier
Abstract Software-Defined Networking (SDN) is an emerging architecture that enables a
computer network to be intelligently and centrally controlled via software applications. It can …
computer network to be intelligently and centrally controlled via software applications. It can …