Abstract. The accuracy of detecting an intrusion within a network of intrusion detection systems (IDSes) depends on the efficiency of collab-oration between member IDSes. The security itself within this network is an additional concern that needs to be addressed. In this paper, we present a trust-based framework for secure and effective collaboration within an intrusion detection network (IDN). In particular, we define a trust model that allows each IDS to evaluate the trustworthiness of others based on personal experience. We prove the correctness of our approach in protecting the IDN. Additionally, experimental results demonstrate that our system yields a significant improvement in detecting intrusions. The trust model further improves th...
Abstract—With the menace of hackers increasing every day, even well administrated networks are vulne...
work (CIDN) allows distributed Intrusion Detection Systems (IDSes) to collaborate and share their kn...
EGC 2009 selected papersInternational audienceTo overcome the problem of attacks on networks, new In...
Abstract The accuracy of detecting an intrusion within a network of intrusion detection systems (IDS...
Abstract—Traditional intrusion detection systems (IDSs) work in isolation and are not effective to d...
Part 2: Full PapersInternational audienceNetwork intrusions are becoming more and more sophisticated...
Collaborative Intrusion Detection Systems (CIDSs) are anemerging field in cyber-security. In such an...
Intrusion detection systems (JDS) are quickly becoming a standard component of a network security i...
Cyber security has become a major challenge when detecting and preventing attacks on any self-organi...
Abstract—Different trust models have been developed for deal-ing with possible dishonest behavior an...
Joint 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communicati...
work (CIDN) allows distributed Intrusion Detection Systems (IDSes) to collaborate and share their kn...
The rapidly increasing array of Internet-scale threats is a pressing problem for every organization ...
In distributed and collaborative attack detection systems decisions are made on the basis of the eve...
The destructive effects of cyber-attacks demand more proactive security approaches. One such promisi...
Abstract—With the menace of hackers increasing every day, even well administrated networks are vulne...
work (CIDN) allows distributed Intrusion Detection Systems (IDSes) to collaborate and share their kn...
EGC 2009 selected papersInternational audienceTo overcome the problem of attacks on networks, new In...
Abstract The accuracy of detecting an intrusion within a network of intrusion detection systems (IDS...
Abstract—Traditional intrusion detection systems (IDSs) work in isolation and are not effective to d...
Part 2: Full PapersInternational audienceNetwork intrusions are becoming more and more sophisticated...
Collaborative Intrusion Detection Systems (CIDSs) are anemerging field in cyber-security. In such an...
Intrusion detection systems (JDS) are quickly becoming a standard component of a network security i...
Cyber security has become a major challenge when detecting and preventing attacks on any self-organi...
Abstract—Different trust models have been developed for deal-ing with possible dishonest behavior an...
Joint 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communicati...
work (CIDN) allows distributed Intrusion Detection Systems (IDSes) to collaborate and share their kn...
The rapidly increasing array of Internet-scale threats is a pressing problem for every organization ...
In distributed and collaborative attack detection systems decisions are made on the basis of the eve...
The destructive effects of cyber-attacks demand more proactive security approaches. One such promisi...
Abstract—With the menace of hackers increasing every day, even well administrated networks are vulne...
work (CIDN) allows distributed Intrusion Detection Systems (IDSes) to collaborate and share their kn...
EGC 2009 selected papersInternational audienceTo overcome the problem of attacks on networks, new In...