Abstract—Traditional intrusion detection systems (IDSs) work in isolation and are not effective to detect unknown threats. An intrusion detection network (IDN) is a collaborative IDS network intended to overcome this weakness by allowing IDS peers to share detection knowledge and experience, and hence improve the overall accuracy of intrusion assessment. However, malicious insiders and free riders may compromise the efficiency of IDNs. In this work, we design a collaborative IDN system and particularly focus on four research problems, namely, trust management, collaborative intrusion decision, resource manage-ment, and collaborators selection. We evaluate our design in terms of several desired properties such as efficiency, robustness, scal...
The increasing array of Internet-scale threats is a pressing problem for every organization that uti...
Abstract — Traditional intrusion detection systems (IDSs) work in isolation and may be easily compro...
Intrusion detection systems (JDS) are quickly becoming a standard component of a network security i...
Abstract The accuracy of detecting an intrusion within a network of intrusion detection systems (IDS...
Part 2: Full PapersInternational audienceNetwork intrusions are becoming more and more sophisticated...
Abstract. The accuracy of detecting an intrusion within a network of intrusion detection systems (ID...
The rapidly increasing array of Internet-scale threats is a pressing problem for every organization ...
The dependency of our society on networked computers has become frightening: In the economy, all-dig...
Computers have virtually changed every aspect of our life. The rapid growth in the development of co...
Collaborative Intrusion Detection Systems (CIDSs) are anemerging field in cyber-security. In such an...
This paper addresses the problem of collaborative analy-sis in a distributed setting via a network s...
Cyber-attacks have nowadays become more frightening than ever before. The growing dependency of our ...
work (CIDN) allows distributed Intrusion Detection Systems (IDSes) to collaborate and share their kn...
Joint 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communicati...
work (CIDN) allows distributed Intrusion Detection Systems (IDSes) to collaborate and share their kn...
The increasing array of Internet-scale threats is a pressing problem for every organization that uti...
Abstract — Traditional intrusion detection systems (IDSs) work in isolation and may be easily compro...
Intrusion detection systems (JDS) are quickly becoming a standard component of a network security i...
Abstract The accuracy of detecting an intrusion within a network of intrusion detection systems (IDS...
Part 2: Full PapersInternational audienceNetwork intrusions are becoming more and more sophisticated...
Abstract. The accuracy of detecting an intrusion within a network of intrusion detection systems (ID...
The rapidly increasing array of Internet-scale threats is a pressing problem for every organization ...
The dependency of our society on networked computers has become frightening: In the economy, all-dig...
Computers have virtually changed every aspect of our life. The rapid growth in the development of co...
Collaborative Intrusion Detection Systems (CIDSs) are anemerging field in cyber-security. In such an...
This paper addresses the problem of collaborative analy-sis in a distributed setting via a network s...
Cyber-attacks have nowadays become more frightening than ever before. The growing dependency of our ...
work (CIDN) allows distributed Intrusion Detection Systems (IDSes) to collaborate and share their kn...
Joint 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communicati...
work (CIDN) allows distributed Intrusion Detection Systems (IDSes) to collaborate and share their kn...
The increasing array of Internet-scale threats is a pressing problem for every organization that uti...
Abstract — Traditional intrusion detection systems (IDSs) work in isolation and may be easily compro...
Intrusion detection systems (JDS) are quickly becoming a standard component of a network security i...