Abstract The accuracy of detecting an intrusion within a network of intrusion detection systems (IDSes) depends on the efficiency of collaboration between member IDSes. The security itself within this network is an additional concern that needs to be addressed. In this paper, we present a trust-based framework for secure and effective collaboration within an intrusion detection network (IDN). In partic-ular, we design a trust model that allows each IDS to evaluate the trustworthiness of other IDSes based on its personal experience. We also propose an admission control algorithm for the IDS to manage the acquaintances it approaches for advice about intrusions. We discuss the effectiveness of our approach in protecting the IDN against common ...
EGC 2009 selected papersInternational audienceTo overcome the problem of attacks on networks, new In...
Joint 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communicati...
The destructive effects of cyber-attacks demand more proactive security approaches. One such promisi...
Abstract. The accuracy of detecting an intrusion within a network of intrusion detection systems (ID...
Collaborative Intrusion Detection Systems (CIDSs) are anemerging field in cyber-security. In such an...
Part 2: Full PapersInternational audienceNetwork intrusions are becoming more and more sophisticated...
Abstract—Traditional intrusion detection systems (IDSs) work in isolation and are not effective to d...
Intrusion detection systems (JDS) are quickly becoming a standard component of a network security i...
Cyber security has become a major challenge when detecting and preventing attacks on any self-organi...
work (CIDN) allows distributed Intrusion Detection Systems (IDSes) to collaborate and share their kn...
The rapidly increasing array of Internet-scale threats is a pressing problem for every organization ...
An effective Collaborative Intrusion Detection Network (CIDN) allows distributed Intrusion Detection...
work (CIDN) allows distributed Intrusion Detection Systems (IDSes) to collaborate and share their kn...
Abstract—Different trust models have been developed for deal-ing with possible dishonest behavior an...
In distributed and collaborative attack detection systems decisions are made on the basis of the eve...
EGC 2009 selected papersInternational audienceTo overcome the problem of attacks on networks, new In...
Joint 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communicati...
The destructive effects of cyber-attacks demand more proactive security approaches. One such promisi...
Abstract. The accuracy of detecting an intrusion within a network of intrusion detection systems (ID...
Collaborative Intrusion Detection Systems (CIDSs) are anemerging field in cyber-security. In such an...
Part 2: Full PapersInternational audienceNetwork intrusions are becoming more and more sophisticated...
Abstract—Traditional intrusion detection systems (IDSs) work in isolation and are not effective to d...
Intrusion detection systems (JDS) are quickly becoming a standard component of a network security i...
Cyber security has become a major challenge when detecting and preventing attacks on any self-organi...
work (CIDN) allows distributed Intrusion Detection Systems (IDSes) to collaborate and share their kn...
The rapidly increasing array of Internet-scale threats is a pressing problem for every organization ...
An effective Collaborative Intrusion Detection Network (CIDN) allows distributed Intrusion Detection...
work (CIDN) allows distributed Intrusion Detection Systems (IDSes) to collaborate and share their kn...
Abstract—Different trust models have been developed for deal-ing with possible dishonest behavior an...
In distributed and collaborative attack detection systems decisions are made on the basis of the eve...
EGC 2009 selected papersInternational audienceTo overcome the problem of attacks on networks, new In...
Joint 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communicati...
The destructive effects of cyber-attacks demand more proactive security approaches. One such promisi...